You might be interested in …

[ThreatPost] VMware ESXi Servers Encrypted by Lightning-Fast Python Script

All posts, ThreatPost

The little snippet of Python code strikes fast and nasty, taking less than three hours to complete a ransomware attack from initial breach to encryption. Source: Read More (Threatpost)

Read More

[SecurityWeek] GitHub Warns of Private Repositories Downloaded Using Stolen OAuth Tokens

All posts, Security Week

GitHub has sounded the alarm on a cyberattack that resulted in the private repositories of dozens of organizations being downloaded by an unauthorized party abusing stolen OAuth user tokens. The incident was identified on April 12, when the code hosting platform observed suspicious activity on its npm production infrastructure. read more Source: Read More (SecurityWeek […]

Read More

[HackerNews] TrickBot Malware Abusing Hacked IoT Devices as Command-and-Control Servers

All posts, HackerNews

Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishing communications with the command-and-control (C2) servers. “By using MikroTik routers as proxy servers for its C2 servers and redirecting the traffic through non-standard ports, TrickBot adds […]

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.