You might be interested in …

[SANS ISC] DShield Data Analysis: Taking a Look at Port 45740 Activity, (Thu, Jun 3rd)

All posts, Sans-ISC

At the SANS Internet Storm Center (ISC), handlers frequently analyze data submitted from DShield participants to determine activity trends and potential attacks. A few days ago on May 31st, I observed a small anomaly for %%port:45740%% and decided to monitor it for the next 3 days or so. There was a huge spike in number […]

Read More

[BleepingComputer] Microsoft pushes emergency fix for Windows PrintNightmare vulnerability

Microsoft has released the KB5004945 emergency security update to fix the actively exploited PrintNightmare zero-day vulnerability in the Windows Print Spooler service impacting all Windows versions. However, the patch is incomplete and the vulnerability can still be locally exploited to gain SYSTEM privileges. […] Source: Read More (BleepingComputer)

Read More

[BleepingComputer] Microsoft build tool abused to deliver password-stealing malware

Threat actors are abusing the Microsoft Build Engine (MSBuild) to deploy remote access tools and information-stealing malware filelessly as part of an ongoing campaign. […] Source: Read More (BleepingComputer)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.