New RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers
Researchers have discovered a new RedAlert (aka N13V) ransomware that encrypts Windows and Linux VMWare ESXi servers and targets corporate networks. MalwareHunterTeam, an information security expert, was the first to…
Does My Phone Have a Virus? Phone Viruses Explained
Phone malware is obviously less widespread – and discussed – as a computer one. Nonetheless, its dangers and attack methods do not differ a lot. So, what is a phone…
AstraLocker Ransomware Operators Publish File Decryption Tools
AstraLocker ransomware operators have announced that the malware is ending its work and have uploaded data decryption tools to VirusTotal. The hackers say that they do not plan to return…
Securing Remote Desktop (RDP)
In 1998, Microsoft introduced the Windows Terminal Server as an add-on to the Windows NT Server 4.0 operating system. This optional feature provided remote desktop access over the network using…
0-Day Vulnerabilities of 2022 Repeat the Mistakes of Past Years
Google Project Zero researcher Maddie Stone published a study on 0-day vulnerabilities in 2022 on GitHub called "0-day In-the-Wild Exploitation in 2022…so far". According to Stone, 9 of the 18…
MITRE experts have published a list of the 25 most dangerous problems of 2022
MITRE experts have published a list of the 25 most common and dangerous problems of 2022. Such bugs can potentially expose systems to attack, allow attackers to take control of…
ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers
Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT) called ZuoRAT, attacking remote workers' routers in North America and Europe since 2020. The malware appeared in the…
Hackers Launched LockBit 3.0 and Bug Bounty Ransomware
The LockBit ransomware group released the LockBit 3.0 malware, at the same time introduced its own bug bounty ransomware program, and also announced that it would accept ransoms in the…
LockBit Weaponizes Its Victims’ Clients – Brett Callow
Brett Callow, a cybersecurity analyst at Emsisoft, shared information on his Twitter about the broadened tactics the LockBit ransomware group applies to its victims. Imagine a firm gets attacked by…
Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2
An information security expert known as mr.d0x has developed a new attack technique that abuses Microsoft Edge WebView2 applications to steal authentication cookies. In theory, this allows bypassing multi-factor authentication…
Conti vs. LockBit 2.0 – a Trend Micro Research in Brief
Trend Micro, a Japanese IT security company, has published a thorough comparison of behaviors of two major ransomware groups: Conti and LockBit 2.0. Here you can read a shorter summary…
Conti Ransomware Shutdown, Site Disabled
Conti operators shut down the remnants of the public infrastructure. Two servers on the Tor network that were used to publish victims' data and negotiate ransoms are down. The Conti…