LEVEL III - PENETRATION TEST
RECENT THREAT POSTS
Attackers are milking unpatched Hikvision video systems to drop a DDoS botnet, researchers warned.
DoH! Nate Warfield, CTO of Prevailion, discusses new stealth tactics threat actors are using for C2, including Malleable C2 from Cobalt Strike's arsenal.
Unauthenticated, remote attackers can achieve root-level RCE on SMA 100-series appliances.
The flaws, which could enable attackers to disable security and gain kernel-level privileges, affect Amazon WorkSpaces and other cloud services that use USB over Ethernet.
The botnet, which resurfaced last month on the back of TrickBot, can now directly install Cobalt Strike on infected devices, giving threat actors direct access to targets.
There's an argument injection weakness in the Windows 10/11 default handler, researchers said: an issue that Microsoft has only partially fixed.
Underground arbitration system settles disputes between cybercriminals.
The malware's unique blockchain-enabled backup C2 scheme makes it difficult to eliminate completely.
One year after the disruptive supply-chain attacks, researchers have observed two new clusters of activity from the Russia-based actors that signal a significant threat may be brewing.
BitMart confirmed it had been drained of ~$150 million in cryptocurrency assets, but a blockchain security firm said it's closer to $200 million.