Severity High Analysis Summary Many ransomware families have changed their tactics and victim-targeting in recent years. Rather than indiscriminate attacks against anyone they’re able to infect, […]
Severity Medium Analysis Summary A new threat actor, tracked as “Vivin,” is found conducting a long-term cryptomining campaign. The group is responsible for mining thousands of […]
Severity High Analysis Summary FireEye has tracked extensive global exploitation of CVE-2019-19781, which continues to impact Citrix ADC and Gateway instances that are unpatched or do […]
Severity High Analysis Summary A family of Monero Miners is found spreading through cloud storage providers such as OneDrive, Google Drive and Dropbox. It also has […]
Severity High Analysis Summary A new module for the TrickBot trojan has been discovered that targets the Active Directory database stored on compromised Windows domain controllers.Once […]
Severity High Analysis Summary A family of Monero Miners that spreads through cloud storage providers such as OneDrive, Google Drive and Dropbox. It also has the […]
Severity High Analysis Summary Nodera is a ransomware family that uses the Node.js framework and was discovered by researchers. The infection chain starts with a VBS […]
Severity High Analysis Summary Identification of new versions of an old Linux malware known as Rekoobe, a minimalistic trojan with a complex CNC authentication protocol originally targeting […]
Severity High Analysis Summary The Emotet malware has started using spam templates of sextortion and ransomware campaigns. At first, it used an extortion demand from a […]