[ThreatPost] Attackers Hijack Email Threads Using ProxyLogon/ProxyShell Flaws

Exploiting Microsoft Exchange ProxyLogon & ProxyShell vulnerabilities, attackers are malspamming replies in existing threads and slipping past malicious-email filters.

Source: Read More (Threatpost)

You might be interested in …

[ZDNet] Home Affairs asks for a rush on Critical Infrastructure Bill to allow ASD to act lawfully

All posts, ZDNet

The Critical Infrastructure Bill is urgently required, the Department of Home Affairs has argued, who noted the rules governing the individual designated sectors could be worked out later by the responsible minister. Source: Read More (Latest topics for ZDNet in Security)

Read More

[HackerNews] [eBook] The Guide to Centralized Log Management for Lean IT Security Teams

All posts, HackerNews

One of the side effects of today’s cyber security landscape is the overwhelming volume of data security teams must aggregate and parse. Lean security teams don’t have it any easier, and the problem is compounded if they must do it manually. Data and log management are essential for organizations to gain real-time transparency and visibility […]

Read More

[TheRecord] Google fixes Android zero-day exploited in the wild in targeted attacks

Google has released on Monday its monthly Android security bulletin, and the company’s engineers said they patched a zero-day vulnerability that was being exploited in the wild in what they described as “limited, targeted exploitation.” Tracked as CVE-2021-1048, Google said the vulnerability resided in one of the Android kernel components and was abused to elevate an attacker’s […]

Read More