You might be interested in …

[ThreatPost] Microsoft, Adobe Exploits Top List of Crooks’ Wish List

All posts, ThreatPost

You can’t possibly patch all CVEs, so focus on the exploits crooks are willing to pay for, as tracked in a study of the underground exploit market. Source: Read More (Threatpost)

Read More

[SecurityWeek] US-UK Gov Warning: SolarWinds Attackers Add Open-Source PenTest Tool to Arsenal

All posts

Agencies in the United States and the United Kingdom on Friday published a joint report providing more details on the activities of the Russian cyberspy group that is believed to be behind the attack on IT management company SolarWinds. The report reveals that the hackers started using the open-source adversary simulation framework Sliver after some […]

Read More

[ThreatPost] Cobalt Strike Usage Explodes Among Cybercrooks

All posts, ThreatPost

The legit security tool has shown up 161 percent more, year-over-year, in cyberattacks, having “gone fully mainstream in the crimeware world.” Source: Read More (Threatpost)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.