Initially, Valak malware was a threat loader but lately, it has turned into a full infostealer program and attack US and German companies. Researchers write that over half of a year Valak has received more than 20 updates. The malware spreads through phishing attacks via Microsoft Word documents with malicious macros. If the malware penetrated…
It would be great if the process of securing a Windows 10 device can be reduced to a simple checklist. But the process of securing is much more complicated than that. The initial setup simply establishes a security baseline. When this configuration is complete, security needs continued vigilance and ongoing effort. A big part of…
Misconfigured Amazon S3 Buckets allowing man-in-the-middle attacks (MiTM).
A number of Russian media and state institutions of Ukraine were attacked by the new ransomware Bad Rabbit.
New attack dubbed «KnockKnock» because attackers «knock» on backdoor system accounts to infiltrate entire O365 environments.
Experts have discovered a new way to bypass the protection against Rowhammer attacks, aimed at DRAM-memory.
Nowadays, it is difficult to surprise someone by malicious advertising campaigns, but the experts of Proofpoint have discovered a new trend in this area. Now attackers are targeting not on the users ‘ browsers and in their routers.