The threat actor behind the supply chain compromise of SolarWinds has continued to expand its malware arsenal with new tools and techniques that were deployed in attacks as early as 2019, once indicative of the elusive nature of the campaigns and the adversary's ability to maintain persistent access for years.
According to cybersecurity firm CrowdStrike, which detailed the novel tactics adopted
http://dlvr.it/SJFn0w
Subscribe to:
Post Comments (Atom)
CISA teases cyber incident reporting rule for critical infrastructure - Compliance Week
CISA teases cyber incident reporting rule for critical infrastructure Compliance Week http://dlvr.it/T4mN8n
-
Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in __...
-
A cyberespionage group with ties to North Korea has resurfaced with a stealthier variant of its remote access trojan called Konni to attack ...
-
NCUA cyber breach rule would give credit unions longer reporting window than banks Banking Dive http://dlvr.it/SVVF51
No comments:
Post a Comment