Linux XorDdos Trojan Use on the Rise
Researchers at Microsoft have noted a “254% increase in activity from a Linux trojan called XorDdos” over the past six months. XorDdos was first detected in 2014; it targets Linux…
Researchers at Microsoft have noted a “254% increase in activity from a Linux trojan called XorDdos” over the past six months. XorDdos was first detected in 2014; it targets Linux…
The new VMware, as part of Broadcom, to offer enterprise customers greater choice and flexibility to address the most complex IT infrastructure challenges. More https://www.broadcom.com/company/news/financial-releases/60271
This was a simple oversight and there is no evidence it's been exploited. While authentication and most rights were indeed checked, the check that the gem you were accessing was…
A critical vulnerability in F5’s Big-IP appliances is being actively exploited. F5 released fixes for the flaw last week. The flaw affects the Big-IP iControl REST authentication component. It can…
This campaign involves Lazarus Group targeting users with spearphishing emails, then installing a set of malicious apps called “TraderTraitor” that disguise themselves as a legitimate cryptocurrency trading application. The ultimate…
GitHub has updated its alert regarding breaches using stolen OAuth token to include a timeline of the attackers’ activity. The threat actor used the tokens to steal repositories belonging to…
In an April 27 blog post, Cloudflare that its “systems automatically detected and mitigated a 15.3 million request-per-second (rps) DDoS attack — one of the largest HTTPS DDoS attacks on…
A collection of vulnerabilities affecting Linux systems could be exploited by local attackers to gain elevated privileges and deploy malware on unprotected systems. Dubbed Nimbuspwn, the security issue involves vulnerabilities…
The Five Eyes countries – Australia, New Zealand, Canada, the UK, and the US – have published a list of the top 15 most routinely exploited vulnerabilities in 2021. The…
According to analysis of recorded ransomware attacks between January and March 2022 by cybersecurity researchers at Digital Shadows, LockBit 2.0 and Conti were the two most active ransomware gangs during…