CISA: CISA Adds Six Known Exploited Vulnerabilities to Catalog
CISA Adds Six Known Exploited Vulnerabilities to Catalog CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Six Known Exploited Vulnerabilities to Catalog CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
VMware Releases Security Update for vCenter Server and Cloud Foundation VMware has released a security update to address multiple memory...
2023 CWE Top 25 Most Dangerous Software Weaknesses The Homeland Security Systems Engineering and Development Institute, sponsored by the Department...
CISA and NSA Release Joint Guidance on Defending Continuous Integration/Continuous Delivery (CI/CD) Environments Today, CISA, together with the National Security...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on June 27, 2023. These...
CISA Adds Eight Known Exploited Vulnerabilities to Catalog CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
CISA Releases Nine Industrial Control Systems Advisories CISA released nine Industrial Control Systems (ICS) advisories on June 29, 2023. These...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that's been...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:fabookie, family:privateloader, family:redline, family:smokeloader, family:tofsee, botnet:@germany, botnet:cloudcosmic, botnet:logsdiller cloud (telegram: @logsdillabot), botnet:pub5, amadey_qbo, backdoor, evasion,...
Score: 9 MALWARE FAMILY: discoveryTAGS:discovery, evasion, persistence, ransomwareMD5: 0198f12db6f250a32c8a500be6a7977eSHA1: d9e46d60555b26bece4ada6ff639bf1c605d3e46ANALYSIS DATE: 2023-06-29T15:20:51ZTTPS: T1490, T1012, T1082, T1060, T1112 ScoreMeaningExample10Known badA malware...
Score: 9 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 4cc8b423908d331d8e2c59d550598d6bSHA1: 3403714d6abffc60486886bcd301316d1ed523d9ANALYSIS DATE: 2023-06-29T15:51:14ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Score: 10 MALWARE FAMILY: bianlian_ransomwareTAGS:family:bianlian_ransomware, ransomware, spyware, stealerMD5: e625ef18487a37a71b489d39c65a343aSHA1: 2a158d21141564af81b4877bdfe622a152449272ANALYSIS DATE: 2023-06-29T16:09:59ZTTPS: T1012, T1120, T1082, T1005, T1081 ScoreMeaningExample10Known badA malware...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 0c8e88877383ccd23a755f429006b437SHA1: 69b3d913a3967153d1e91ba1a31ebed839b297edANALYSIS DATE: 2023-06-29T16:29:05ZTTPS: T1005, T1081 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...
Score: 5 MALWARE FAMILY: TAGS:MD5: a89167e3878eb3c1d77e6aa0503eb108SHA1: 7a377cbacdb226209e4a0b8e266183c344707275ANALYSIS DATE: 2023-06-29T16:32:39ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...
Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, persistence, ransomware, spyware, stealer, wormMD5: e4df89514610e82a6884fd92ddab45f8SHA1: 36228c8b0906670639df4f520bd18906c011da72ANALYSIS DATE: 2023-06-29T17:32:39ZTTPS: T1082, T1491, T1112, T1102, T1107,...
Score: 10 MALWARE FAMILY: medusalockerTAGS:family:medusalocker, evasion, ransomware, spyware, stealer, trojan, upxMD5: f6f120d1262b88f79debb5d848ac7db9SHA1: 1339282f9b2d2a41326daf3cf284ec2ae8f0f93cANALYSIS DATE: 2023-06-29T16:29:55ZTTPS: T1088, T1089, T1112, T1005, T1081,...
CISA Releases Nine Industrial Control Systems Advisories CISA released nine Industrial Control Systems (ICS) advisories on June 29, 2023. These...
2023 CWE Top 25 Most Dangerous Software Weaknesses The Homeland Security Systems Engineering and Development Institute, sponsored by the Department...
CISA Adds Eight Known Exploited Vulnerabilities to Catalog CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse. The malware "represents a significant shift...
The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat in attacks exploiting the Log4j...
Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal sensitive data associated...
Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure - especially when...