Metasploit has published an exploit for the BlueKeep vulnerability (CVE-2019-0708), a much-discussed critical weakness that affects older versions of Microsoft Windows. The "wormability" of BlueKeep makes it dangerous, and id successfully exploited,
Our midyear security roundup highlights threats that made their mark in the first half of 2019, and provides security insights to help users and organizations determine the right solutions and defense strategies against them.
Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.
There’s a new player in the exploit kit landscape. Dubbed Lord, this new exploit kit was initially seen delivering the njRAT malwarebefore distributing the Eris ransomware. Here's what you need to know about this threat.
Hackers use fileless threats to take advantage of existing applications and attack systems. Here we discuss noteworthy events, techniques, and best practices that can help identify fileless threats and defend against attacks.