Cybersecurity agencies in the United States, Canada, United Kingdom, Australia and New Zealand have shared a list of the 15 most exploited vulnerabilities of 2021.
Source: Read More (SecurityWeek RSS Feed)
A security researcher has published this week a tool to flood Cobalt Strike servers—often used by malware gangs—with fake beacons in order to corrupt their internal databases of infected systems. Named CobaltSpam, the tool was developed by security researcher Mario Henkel. Henkel told The Record today that he created the tool on top of CobaltStrikeParser, a project from security firm […]
Malware works by exploiting vulnerabilities in software and hardware. However, malware itself is also software, and inevitably has its own vulnerabilities. One security researcher has started taking advantage of this by publishing exploits using vulnerabilities in multiple strains of ransomware. Source: Read More (NCSC-FI daily news followup)
Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount www.wired.com/story/iran-hackers-us-phishing-tensions/ WHEN TWO COUNTRIES begin to threaten war in 2019, it’s a safe bet that they’ve already been hacking each other’s networks. Right on schedule, three different cybersecurity firms now say they’ve watched Iran’s hackers try to gain access to a wide array of US […]