Hunting COM Objects
June 4 2019COM objects have recently been used by penetration testers, Red Teams, and malicious actors to perform lateral movement. COM objects were studied by several other researchers in...
Read moreCOM objects have recently been used by penetration testers, Red Teams, and malicious actors to perform lateral movement. COM objects were studied by several other researchers in...
Read moreFor almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as “Robbinhood.” Media publications have cited...
Read moreFor almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as “Robbinhood.” Media publications have cited...
Read moreGroup’s constant experimentation and malware changes are complicating efforts for defenders, Kaspersky Lab says. Zebrocy, a Russian-speaking advanced persistent threat (APT) actor associated with numerous attacks on government, military,...
Read moreGroup’s constant experimentation and malware changes are complicating efforts for defenders, Kaspersky Lab says. Zebrocy, a Russian-speaking advanced persistent threat (APT) actor associated with numerous attacks on government, military,...
Read moreFearing another worm of WannaCry severity, Microsoft warns vulnerable users to apply the software update for CVE-2019-0708. Microsoft’s Security Response Team (MSRC) is warning organizations to patch BlueKeep (CVE-2019-0708),...
Read moreFearing another worm of WannaCry severity, Microsoft warns vulnerable users to apply the software update for CVE-2019-0708. Microsoft’s Security Response Team (MSRC) is warning organizations to patch BlueKeep (CVE-2019-0708),...
Read moreIs cybersecurity worth the investment? It depends. As the world watched the EU hit Google with the biggest data protection fine in history earlier this year, businesses across the...
Read moreIs cybersecurity worth the investment? It depends. As the world watched the EU hit Google with the biggest data protection fine in history earlier this year, businesses across the...
Read moreLearn about the latest supply chain attacks, red team threats, and “deep fake” detection tricks at the premier cybersecurity event in Las Vegas this August. The threat landscape is...
Read more
Recent Comments