Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

Reverse Shell Botnet Gitpaste-12 Spreads Via GitHub And Pastebin
Reverse Shell Botnet Gitpaste-12 Spreads Via GitHub And Pastebin
Reverse Shell Botnet Gitpaste-12 Spreads Via GitHub And Pastebin
Reverse Shell Botnet Gitpaste-12 Spreads Via GitHub And Pastebin

Reverse Shell Botnet Gitpaste-12 Spreads Via GitHub And Pastebin

Reverse Shell Botnet Gitpaste-12 Spreads Via GitHub And Pastebin A newly discovered worm and botnet named Gitpaste-12 lives on GitHub and also uses Pastebin to host malicious code. The advanced malware comes equipped with reverse shell and crypto-mining capabilities and exploits over 12 known vulnerabilities, therefore the moniker. Spreads via GitHub, attacks in 12 different ways Gitpaste-12 was

Campari Hit By Ragnar Locker Ransomware, $15 Million Demanded

Campari Hit By Ragnar Locker Ransomware, $15 Million Demanded Italian liquor company Campari Group was hit by a Ragnar Locker ransomware attack, where 2 TB of unencrypted files was allegedly stolen. To recover their files, Ragnar Locker is demanding $15 million. Campari Group is an Italian beverage company known for its popular liquor brands, including

Brazil’s Court System Under Massive RansomExx Ransomware Attack

Brazil’s Court System Under Massive RansomExx Ransomware Attack Brazil’s Superior Court of Justice was hit by a ransomware attack on Tuesday during judgment sessions that were taking place over video conference. “The Superior Court of Justice (STJ) announces that the court’s information technology network suffered a hacker attack on Tuesday (3), during the afternoon, when the six group

Critical Bug Actively Used To Deploy Cobalt Strike On Oracle Servers

Critical Bug Actively Used To Deploy Cobalt Strike On Oracle Servers Threat actors are actively exploiting Oracle WebLogic servers unpatched against CVE-2020-14882 to deploy Cobalt Strike beacons which allow for persistent remote access to compromised devices. Cobalt Strike is a legitimate penetration testing tool also used by threat actors in post-exploitation tasks and to deploy so-called

× Chat with us