LockBit uses automated attack tools to identify tasty targets

Credit to Author: gallagherseanm| Date: Wed, 21 Oct 2020 12:30:09 +0000

Using renamed copies of PowerShell and Windows’VBscript host and scripts based on PowerShell pen-testing tool, LockBit actors searched for systems with valuable data to hit at small organizations.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/rPN_OaRbtnE” height=”1″ width=”1″ alt=””/>

Read more

Top reason to apply October, 2020’s Microsoft patches: Ping of Death Redux

Credit to Author: SophosLabs Offensive Security| Date: Tue, 13 Oct 2020 18:11:11 +0000

A vulnerability in Windows’ TCP/IP driver handling of IPv6 allows denial of service—and possibly remote code execution.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/u1HrsSyhOLQ” height=”1″ width=”1″ alt=””/>

Read more

Maze attackers adopt Ragnar Locker virtual machine technique

Credit to Author: Andrew Brandt| Date: Thu, 17 Sep 2020 13:00:51 +0000

Under pressure to evade detection by endpoint protection, ransomware criminals try a more radical approach<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/Sl7s3Pwxoc8″ height=”1″ width=”1″ alt=””/>

Read more

Faking it: the thriving business of “fake alert” web scams

Credit to Author: gallagherseanm| Date: Wed, 09 Sep 2020 13:00:21 +0000

Tech support scams and “scarevertising” for questionable mobile apps use ad networks to find their unwitting victims.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/K501HPcYAA0″ height=”1″ width=”1″ alt=””/>

Read more