The AnteFrigus ransomware is delivered via a malvertising campaign to lure victims to the RIG exploit kit server, while the PureLocker ransomware, has been observed to launch targeted attacks against enterprise production servers.
Our latest research explored threats to 5G connectivity — from SIM jacking, identity fraud, fake news, and poisoning machine learning rules to manipulating business decisions — and they can be addressed through an identity-based approach to security.
There are plans to update the BlueKeep Metasploit exploit after recent investigations revealed that the exploit triggers the blue screen of death in devices. This comes after recent reports of BlueKeep being used to install cryptocurrency miners on vulnerable
We have developed a machine learning model called TrendX Hybrid Model that uses two training phases — pre-training and training — and allows us to correlate static and behavior features to improve detection rates and reduce false positives.
Details on the proof-of-concept (PoC) exploit for two unpatched, critical remote code execution (RCE) vulnerabilities in the network configuration management utility rConfig have been recently disclosed.