The operators of the SolarMarker information stealer and backdoor have been discovered using subtle ways to create long-term persistence on compromised computers, indicating that threat actors are constantly changing tactics and updating their defensive mechanisms.
Read MoreCritical firmware bugs found in products from major IT manufacturers, another WordPress plugin vulnerability found, and this is Identity Theft Awareness Week.
Read MoreCritical Vulnerability Enables Malicious Actors to Control Applications
Read MoreRussian President Putin held his promised news conference yesterday, the New York Times reports. The crisis over Ukraine, he said, is a provocation entirely made in America. “[The Americans'] most important task is to contain Russia’s development. Ukraine is just an instrument of achieving this goal. It can be done in different ways, such as pulling us into some armed conflict and then forcing their allies in Europe to enact those harsh sanctions against us that are being discussed today in the United States.”
Read MoreThe SolarMarker information stealer and backdoor operators have been discovered using sneaky Windows Registry methods to create long-term persistence on compromised devices, hinting that threat actors are consistently changing tactics and updating their defensive tools. Despite the operation’s drop in November 2021, the remote access implants are still found on targeted networks, according to cybersecurity company Sophos, which spotted the new behavior.
Read MoreYesterday's UN Security Council meeting over the Russian threat to Ukraine was marked by acrimony and small progress toward any resolution (the Washington Post describes the sharp exchanges) but negotiations over the crisis continue today on a bilateral basis as US Secretary of State Blinken talks with Russian Foreign Minister Lavrov.
Read MoreIn a sign that threat actors continuously shift tactics and update their defensive measures, the operators of the SolarMarker information stealer and backdoor have been found leveraging stealthy Windows Registry tricks to establish long-term persistence on compromised systems.
Read MoreThreat actors are using a customized public exploit for the Log4Shell vulnerability to attack and take over Ubiquiti network appliances running the UniFi software, security firm Morphisec said in a report last week.
Read MoreRussian cyberattacks continue to afflict targets in Ukraine even as Russian conventional forces remain poised in assembly areas. US Secretary of Defense Austin and Chairman of the Joint Chiefs of Staff Milley said late last week that, while intentions remained "opaque," Russia's capabilities were up to a damaging invasion of Ukraine.
Read MoreA new, complex phishing assault has been noticed conveying the AsyncRAT trojan as a component of a malware crusade that is accepted to have been initiated in September 2021.
Read More