Category: Threat Research

Providing Solutions

Log4Shell Hell: anatomy of an exploit outbreak

A vulnerability in a widely-used Java logging component is exposing untold numbers of organizations to potential remote code attacks and information exposure.

Two flavors of Tor2Mine miner dig deep into networks with PowerShell, VBScript

Using remote scripts and code, one variant can even execute filelessly until it gains administrative credentials.

Android APT spyware, targeting Middle East victims, enhances evasiveness

The phone spyware has new features that confer resistance to takedowns or manual removal

New ransomware actor uses password-protected archives to bypass encryption protection

Calling themselves “Memento team”, actors use Python-based ransomware that they reconfigured after setbacks.