Skip to content
vshieldz
Home Page
Services
Our Partner
News
Contact

Call us anytime

+84949482065

Blog & News

  1. Home>
  2. News>
  3. Blog & News>
  4. Page 6
Read more about the article Ransomware attackers introduce new EDR killer to their arsenal

Ransomware attackers introduce new EDR killer to their arsenal

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A threat actor linked to the RansomHub ransomware has been observed using a new tool EDRKillShifter that can terminate EDR software on compromised systems. More info https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/

Continue ReadingRansomware attackers introduce new EDR killer to their arsenal
Read more about the article Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A critical security flaw, CVE-2024-37287, has been identified in Kibana, an open-source data visualization and exploration tool, which could allow attackers to execute arbitrary code via a prototype pollution vulnerability.…

Continue ReadingKibana arbitrary code execution via prototype pollution (ESA-2024-22)
Read more about the article Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

Threat actors have been found hijacking legitimate anti-virus software to conduct undetected malicious activities, using a new tool called SbaProxy that masquerades as legitimate anti-virus components to create proxy connections…

Continue ReadingHijacked: How Cybercriminals Are Turning Anti-Virus Software Against You
Read more about the article NIST Releases Post-Quantum Cryptography Standards

NIST Releases Post-Quantum Cryptography Standards

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

The US National Institute of Standards and Technology (NIST) has published three post-quantum cryptography (PQC) algorithms: ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (Sphincs+). A fourth algorithm, FN-DSA (FALCON), is expected…

Continue ReadingNIST Releases Post-Quantum Cryptography Standards
Read more about the article Crash Reports Hold Valuable Vulnerability Information

Crash Reports Hold Valuable Vulnerability Information

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Speaking at the BlackHat USA conference earlier this week, security researcher Patrick Wardle said that computer crash reports offer “a myriad of information that will allow us to extract malware,…

Continue ReadingCrash Reports Hold Valuable Vulnerability Information
Read more about the article 0.0.0.0 Vulnerability

0.0.0.0 Vulnerability

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Researchers at Oligo Security have identified a zero-day vulnerability affecting all major browsers that could be exploited to bypass browser security and possibly access local networks. According to the researchers,…

Continue Reading0.0.0.0 Vulnerability
Read more about the article CrowdStrike Publishes External Technical Root Cause Analysis

CrowdStrike Publishes External Technical Root Cause Analysis

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

CrowdStrike has published a technical root cause analysis of the July 19 incident that disrupted travel and commerce worldwide due to an out-of-bounds read issue “beyond the end of the…

Continue ReadingCrowdStrike Publishes External Technical Root Cause Analysis
Read more about the article Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Authorities have seized over $41 million that was stolen from a commodities firm in Singapore in a business email compromise (BEC) attack. The thieves, impersonating a supplier, requested that a…

Continue ReadingPolice in Singapore Recover Millions Stolen in Business eMail Compromise Scheme
Read more about the article Linux Kernel SLUBStick Attack

Linux Kernel SLUBStick Attack

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Researchers from Graz University of Technology in Austria have published a paper that describes “a novel kernel exploitation technique elevating a limited heap vulnerability to an arbitrary memory read-and-write primitive.”…

Continue ReadingLinux Kernel SLUBStick Attack
Read more about the article AWS is Using a Neural Network to Detect Malicious Domains

AWS is Using a Neural Network to Detect Malicious Domains

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

AWS says it is using a neural network called Mithra, “a massive internal neural network graph model … that uses algorithms for threat intelligence” to identify malicious domains. Mithra has…

Continue ReadingAWS is Using a Neural Network to Detect Malicious Domains
  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 40
  • Go to the next page
footer
vShieldz Technologies Ltd
+84949482065
  • [email protected]
  • 429 Le Van Viet st, Tang Nhon Phu A, Thu Duc, Ho Chi Minh city, Vietnam

links

  • Our Partner
  • Our Services
  • Contact Us
  • News

recent post

  • Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
    Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
    27 April 2025/
    0 Comments
  • Spanish Water Supplier Target of Cyberattack
    Spanish Water Supplier Target of Cyberattack
    27 April 2025/
    0 Comments
Copyright 2021 vShieldz Technologies Ltd
Thiết Kế Bởi Vĩnh XD