Skip to content
Saturday, May 24, 2025
Latest:
  • The US Is Building a One-Stop Shop for Buying Your Data
  • Oops: DanaBot Malware Devs Infected Their Own PCs
  • Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
  • Why 3D-Printing an Untraceable Ghost Gun Is Easier Than Ever
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

    Computer Security Articles

    RSS Reader for Computer Security Articles

    • Home
      • Fortinet
      • MalwareBytes
      • Sophos
      • TrendMicro
      • Kaspersky
      • QuickHeal
    • Independent
      • Krebs
      • Securiteam
      • ComputerWorld
    • ScadaICS
      • Schneider
    • Security Videos
    • ThreatMap Fortinet

    quasar

    MalwareBytesSecurity
    September 26, 2018 admin

    Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT

    Credit to Author: Jérôme Segura| Date: Wed, 26 Sep 2018 17:13:26 +0000

    A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.

    Categories:

    • Exploits
    • Threat analysis

    Tags: anti exploitCVE-2018-8174CVE-2018-8373exploitIndicators of compromiseIOCIOCspastebinpatchQuasarratremote administration toolvirustotalvulnerabilitiesvulnerability

    (Read more…)

    The post Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT appeared first on Malwarebytes Labs.

    Read More
    IndependentMotherBoardSecurity
    August 28, 2017 admin

    The Light of a Quasar Revealed This Distant Galaxy’s Magnetic Field

    Credit to Author: Jacob Dubé| Date: Mon, 28 Aug 2017 15:00:00 +0000

    My God, it’s full of magnets.

    Read More

    Connect with:

    Recent Posts

    • The US Is Building a One-Stop Shop for Buying Your Data
    • Oops: DanaBot Malware Devs Infected Their Own PCs
    • Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
    • Why 3D-Printing an Untraceable Ghost Gun Is Easier Than Ever
    • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

    Categories

    • ComputerWorld (1,732)
    • Fortinet (648)
    • Independent (3,629)
    • Kaspersky (1,498)
    • Krebs (821)
    • Magazine (81)
    • MalwareBytes (3,204)
    • Microsoft (872)
    • MotherBoard (849)
    • QuickHeal (455)
    • ScadaICS (2,845)
    • Schneider (2,845)
    • Securiteam (217)
    • Security (13,994)
    • Sophos (1,618)
    • TrendMicro (1,367)
    • VirusBulletin (81)
    • Wired (3,392)
      Copyright © 2025 Computer Security Articles. All rights reserved.
      Theme: ColorMag by ThemeGrill. Powered by WordPress.