Shares

CNA shares details about ransomware attack, recovery effort

The company, one of the biggest players in cybersecurity insurance specifically, had previously acknowledged an attack, but stopped short of… Read More

3 years ago

Exchange Server attacks: Microsoft shares intelligence on post-compromise activities

Many on-premises Microsoft Exchange servers are being patched, but Microsoft warns that its investigations have found multiple threats lurking on… Read More

3 years ago

Chile's bank regulator shares IOCs after Microsoft Exchange hack

Chile's ComisiĆ³n para el Mercado Financiero (CMF) has disclosed that their Microsoft Exchange server was compromised through the recently disclosed… Read More

3 years ago

Microsoft shares detection, mitigation advice for Azure LoLBins

Using LoLBins, attackers can abuse a wide range of Window legitimate tools, including but not limited to Microsoft Defender, Windows… Read More

3 years ago

A New Malware Shares Similarities With WaterBear

Palo Alto Networks found a highly sophisticated malware potentially linked to the BlackTech hacking group. It has features and behavior… Read More

3 years ago

Microsoft Shares CodeQL Queries to Scan for Malicious Implants Matching SolarWinds Supply Chain Attack

To make sure the attackers did not modify their code, Microsoft created CodeQL queries that were used to scan their… Read More

3 years ago

NSA shares guidance, tools to mitigate weak encryption protocols

The Countrywide Stability Agency (NSA) has shared guidance on how to detect and swap outdated Transportation Layer Security (TLS) protocol… Read More

3 years ago

Federal Reserve shares tips on mitigating synthetic identity fraud

The U.S. Federal Reserve now issued steering on how money organizations from the United States can mitigate payment fraud tries… Read More

4 years ago

US Govt shares tips on defending against cyberattacks via Tor

The CISA advisory, penned in collaboration with the FBI, shares technical details on how threat actors can use Tor software… Read More

4 years ago

Visa shares details for two attacks on North American hospitality merchants

In accordance to a protection inform published by VISA, threat actors infected the methods of the two unnamed organizations with… Read More

4 years ago

US CISA report shares details on web shells used by Iranian hackers

The CISA report contains technological information of 19 files, including various parts of the China Chopper internet shell, like an… Read More

4 years ago