Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

The Week in Ransomware – March 12th 2021 – Encrypting Exchange Servers
The Week in Ransomware – March 12th 2021 – Encrypting Exchange Servers
The Week in Ransomware – March 12th 2021 – Encrypting Exchange Servers
The Week in Ransomware – March 12th 2021 – Encrypting Exchange Servers

The Week in Ransomware – March 12th 2021 – Encrypting Exchange Servers

The Week in Ransomware – March 12th 2021 – Encrypting Exchange Servers For the past two weeks, the cybersecurity news has been dominated by stories about the Microsoft Exchange ProxyLogon vulnerabilities. One overriding concern has been when will ransomware actors use the vulnerabilities to compromise and encrypt mail servers. Unfortunately, last night our fears became

Microsoft Exchange Exploits Now Used By Cryptomining Malware

Microsoft Exchange Exploits Now Used By Cryptomining Malware The operators of Lemon_Duck, a cryptomining botnet that targets enterprise networks, are now using Microsoft Exchange ProxyLogon exploits in attacks against unpatched servers. The malware is known for installing XMRig Monero (XMR) CPU coinminers on infected devices to mine cryptocurrency for the botnet’s owners. Lemon_Duck’s ongoing attacks

Researchers Hacked Indian Govt Sites Via Exposed Git And Env Files

Researchers Hacked Indian Govt Sites Via Exposed Git And Env Files Researchers have now disclosed more information on how they were able to breach multiple websites of the Indian government. Last month, researchers from the Sakura Samurai hacking group had partially disclosed that they had breached cyber systems of Indian government after finding a large number of critical vulnerabilities. The

New ZHtrap Botnet Malware Deploys Honeypots To Find More Targets

New ZHtrap Botnet Malware Deploys Honeypots To Find More Targets A new botnet is hunting down and transforming infected routers, DVRs, and UPnP network devices into honeypots that help it find other targets to infect. The malware, dubbed ZHtrap by the 360 Netlab security researchers who spotted it, is loosely based on Mirai’s source code, and it comes

× Chat with us