Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
Deja-Vu data from this year’s DBIR report feels like we are stuck in the movie ‘Groundhog Day.’
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of “triple extortion” ransomware attacks.
The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020.
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, Chief Security Strategist & […]
Threat actors already are exploiting vulnerability, dubbed ‘Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.
The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn.
Malware borrows generously from code used by other botnets such as Mirai, Qbot and Zbot.
When you visit this site, cookies will be placed on your machine for tracking visitor activity anonymously and remembering user preferences. We set a cookie to remember that you don't want to see this infobar that warns you about cookies on this site. If you click the button to enable this, you will not see this infobar on future visits* and you will opt in to having a cookie placed on your machine by us. This site makes use of some third party services who also store cookies (Third party cookies) on your machine.
These services are:
– Google Analytics
– Google AdSense
If you would like more general information on controlling cookies, please visit www.aboutcookies.org.
*Note: cookies are browser-specific. If you visit using a different browser or on another machine, you may see the infobar again.