Vulnerability & Threat Management

15 08, 2018

Ransomware in India: the SamSam Ransomware and Beyond

By | August 15th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware in India: the SamSam Ransomware and Beyond on Ransomware in India: the SamSam Ransomware and Beyond

Survey shows ransomware in India is prevalent, ranking sixth among countries affected by SamSam — how will they cope?
27 07, 2018

Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks

By | July 27th, 2018|Threat Intelligence|Comments Off on Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks on Oracle WebLogic Vulnerability Used for Cryptomining and Other Attacks

A recently published Oracle WebLogic vulnerability has been exploited in large-scale campaigns, many to mine cryptocurrency for the attackers such as Iuoxk Group
26 07, 2018

Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

By | July 26th, 2018|Vulnerability & Threat Management|Comments Off on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware on Cryptominers Surpass Ransomware as Most Widespread Cybercrime Malware

Report shows malicious cryptominers and ransomware trading places in attack popularity between the last half of 2017 and first half of 2018
20 07, 2018

Spectre Reemerges With Two New Variants

By | July 20th, 2018|Vulnerability & Threat Management|Comments Off on Spectre Reemerges With Two New Variants on Spectre Reemerges With Two New Variants

The Intel chip-level flaw is back with two new variants, Spectre 1.1 and 1.2, with some patches available
3 07, 2018

Cisco ASA Vulnerabilities See POC and Active Exploits

By | July 3rd, 2018|Uncategorized, Vulnerability & Threat Management|Comments Off on Cisco ASA Vulnerabilities See POC and Active Exploits on Cisco ASA Vulnerabilities See POC and Active Exploits

Cisco confirms limited exploitation in the wild of a recently disclosed Cisco ASA flaw, still cause for concern around EXTRABACON and EPICBANANA
11 06, 2018

Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability

By | June 11th, 2018|Vulnerability & Threat Management|Comments Off on Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability on Thousands of Open Source Projects at Risk Due to Zip Slip Vulnerability

An archive extraction vulnerability known as “Zip Slip” is putting thousands of open source projects across many ecosystems at risk
28 05, 2018

VPNFilter Malware: What we know so far on the router threat

By | May 28th, 2018|Threat Intelligence|Comments Off on VPNFilter Malware: What we know so far on the router threat on VPNFilter Malware: What we know so far on the router threat

A new destructive VPNFilter malware has compromised 500,000 networking devices worldwide
23 05, 2018

Speculative Store Buffer Bypass, Rogue System Register Read

By | May 23rd, 2018|Vulnerability & Threat Management|Comments Off on Speculative Store Buffer Bypass, Rogue System Register Read on Speculative Store Buffer Bypass, Rogue System Register Read

Bug bounties pay off, uncovering two more side-channel flaws in the wake of Meltdown and Spectre
10 05, 2018

Double Kill Exploit Jumps From MS Office to Internet Explorer

By | May 10th, 2018|Threat Intelligence|Comments Off on Double Kill Exploit Jumps From MS Office to Internet Explorer on Double Kill Exploit Jumps From MS Office to Internet Explorer

The Double Kill exploit of a VBScript Engine vulnerability uses a first-of-its-kind attack method we’ll likely see more of in the future
9 05, 2018

Ransomware Packs a Punch but Malicious Cryptomining Spikes

By | May 9th, 2018|Vulnerability & Threat Management|Comments Off on Ransomware Packs a Punch but Malicious Cryptomining Spikes on Ransomware Packs a Punch but Malicious Cryptomining Spikes

While ransomware threats have given some ground to malicious cryptomining, the attacks still hit hard