You might be interested in …

[TheRecord] CobaltSpam tool can flood Cobalt Strike malware servers

A security researcher has published this week a tool to flood Cobalt Strike servers—often used by malware gangs—with fake beacons in order to corrupt their internal databases of infected systems. Named CobaltSpam, the tool was developed by security researcher Mario Henkel. Henkel told The Record today that he created the tool on top of CobaltStrikeParser, a project from security firm […]

Read More

[SecurityWeek] OT Data Stolen by Ransomware Gangs Can Facilitate Cyber-Physical Attacks

All posts, Security Week

Many of the ransomware attacks on industrial and critical infrastructure organizations result in the exposure of operational technology (OT) data that could be useful to threat actors, including to conduct cyber-physical attacks, according to Mandiant. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[NCSC-FI News] Ukrainian CERT Warns Citizens of a New Wave of Attacks Distributing Jester Malware

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of phishing attacks that deploy an information-stealing malware called Jester Stealer on compromised systems The mass email campaign carries the subject line “chemical attack” and contains a link to a macro-enabled Microsoft Excel file, opening which leads to computers getting infected with Jester Stealer. Source: […]

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.