Security
Headlines
HeadlinesLatestCVEs

Tag

#microsoft

Renewed Focus on Incident Response Brings New Competitors and Partnerships

Microsoft and others are doubling down on incident response, adding services and integrating programs to make security analysts and incident response engagements more efficient.

DARKReading
#mac#google#microsoft#intel#ibm
Roxy Fileman 1.4.5 Shell Upload

Roxy Fileman versions 1.4.5 and below for .NET suffer from a remote shell upload vulnerability.

Windows Kernel Registry Key Issue

The Microsoft Windows kernel suffers from multiple issues with subkeys of transactionally renamed registry keys.

ESET Service 16.0.26.0 Unquoted Service Path

ESET Service version 16.0.26.0 suffers from an unquoted service path vulnerability.

Protecting your business with Wazuh: The open source security platform

Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration. The threat landscape constantly evolves, and it can be overwhelming for businesses to keep up with the latest security trends. Security teams use processes and security solutions to curb these challenges. These solutions include firewalls, antiviruses, data

CISA Warns of 5 Actively Exploited Security Flaws: Urgent Action Required

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. This includes three high-severity flaws in the Veritas Backup Exec Agent software (CVE-2021-27876, CVE-2021-27877, and CVE-2021-27878) that could lead to the execution of privileged commands

Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise

The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise of a ransomware operation. That's according to new findings from the Microsoft Threat Intelligence team, which discovered the threat actor targeting both on-premises and cloud infrastructures in partnership with another emerging activity cluster dubbed

Microsoft and Fortra to Take Down Malicious Cobalt Strike Infrastructure

By Deeba Ahmed Cobalt Strike is a legitimate post-exploitation tool designed by Raphael Mudge of Fortra for adversary simulation but it has also been abused by cybercriminals. This is a post from HackRead.com Read the original post: Microsoft and Fortra to Take Down Malicious Cobalt Strike Infrastructure

Threat Roundup for March 31 to April 7

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 31 and April 7. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key

Microsoft, Fortra & Health-ISAC Team Up to Remove Illicit Cobalt Strike Tools

The effort aims to disrupt the use of altered Cobalt Strike software by cybercriminals in ransomware and other attacks.