Category: Threat Research

Providing Solutions

Horde of miner bots and backdoors leveraged Log4J to attack VMware Horizon servers

In the wake of December 2021 exposure of a remote code execution vulnerability (dubbed “Log4Shell”) in the ubiquitous Log4J Java logging library, we tracked widespread attempts to scan for and exploit the weakness—particularly among cryptocurrency mining bots. The vulnerability affected hundreds of software products, making it difficult for some organizations to assess their exposure. One…
Read more

CryptoRom Bitcoin swindlers continue to target vulnerable iPhone and Android users

Abuse of iOS TestFlight and WebClips—along with social engineering and lookalike web pages—lead to double- and triple-dipping by criminals into victims’ pockets.

Qakbot injects itself into the middle of your conversations

The heavily distributed botnet delivers a wide variety of payloads – and scans your network for weaknesses

Microsoft patches 71 vulnerabilities including RDP Client, Exchange Server, Intune

Just two Critical-class vulnerabilities, but Windows Update doesn’t handle every package this month