Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware
Recent Log4j attacks use obfuscated LDAP requests to execute malicious scripts, establish persistence, and exfiltrate [...]
Recent Log4j attacks use obfuscated LDAP requests to execute malicious scripts, establish persistence, and exfiltrate [...]
Researchers uncover new attack vectors in MIFARE Classic cards by analyzing the CRYPTO-1 algorithm and [...]
A critical vulnerability in several D-Link wireless router models allows unauthenticated attackers to gain administrative [...]
WARMCOOKIE is a new Windows backdoor delivered via a phishing campaign called REF6127. It can [...]
Andres Freund discovered a backdoor in the liblzma library, part of the XZ data compression [...]