Report: Russian Hackers Exploit Lithuanian Infrastructure

Hacker groups linked to Russian intelligence conducted cyber-attacks against top Lithuanian officials and decision-makers last year and used the Baltic nation’s technology infrastructure as a base to hit targets elsewhere, a report by Lithuania’s intelligence service said Thursday. read more SecurityWeek RSS Feed

CVE-2016-7200 & CVE-2016-7201 (Edge) and Exploit Kits

CVE-2016-7200 & CVE-2016-7201 are vulnerabilities in the Chakra JavaScript scripting engine in Microsoft Edge. Reported by Natalie Silvanovich of Google Project Zero, those have been fixed  in november 2016 (MS16-129) by Microsoft. Note : No successful exploitation seen despite integration tries. On 2017-01-04 @theori_io released a POC Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) […]

Bye Empire, Hello Nebula Exploit Kit.

Nebula Logo While Empire (RIG-E) disappeared at the end of December after 4 months of activity Illustration of  the last month of witnessed Activity for Empire on 2017-02-17 an advert for a new exploit kit dubbed Nebula appeared underground. ——Selling EK Nebula——Nebula Exploit kitFeatures:-Automatic domain scanning and generating (99% FUD)-API rotator domains-Exploit rate tested in different […]

CVE-2018-4878 (Flash Player up to 28.0.0.137) and Exploit Kits

The CVE-2018-4878 is a bug that allows remote code execution in Flash Player up to 28.0.0.137, spotted in the wild as a 0day, announced by the South-Korean CERT on the 31st of January. Patched on February 6, 2018 with ASPB18-03. Seen in malspam campaign two weeks after, it’s now beeing integrated in Exploit Kits. This […]

Extortion Gang Breaches Cybersecurity Firm Qualys Using Accellion Exploit

Enterprise cloud security firm Qualys has become the latest victim to join a long list of entities to have suffered a data breach after zero-day vulnerabilities in its Accellion File Transfer Appliance (FTA) server were exploited to steal sensitive business documents. As proof of access to the data, the cybercriminals behind the recent hacks targeting […]

Next Page »