Apr 17, 2024NewsroomEncryption / Vulnerability Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage CVE-2023-22518 (CVSS score: 9.1), a critical security vulnerability impacting the Atlassian Confluence Data Center and Server that allows an unauthenticated attacker to reset Confluence and create an administrator account. Armed […]
Kroll has uncovered a sophisticated cyberattack leveraging vulnerabilities in ConnectWise ScreenConnect software to deploy a variant of the BabyShark malware dubbed ToddlerShark. This targeted campaign exploits ScreenConnect flaws in the remote access tool to gain unauthorized access and deliver the malicious payload. Diving into details The North Korean APT group Kimsuky is reportedly exploiting ScreenConnect […]
Ransomware actors are exploiting TeamViewer to gain access to organization endpoints and attempt to deploy ransomware, highlighting the importance of maintaining strong security practices and using the latest software versions.
A recent investigation has brought to light the activities of threat actors utilizing Discord to deploy an information-stealing malware named Lumma Stealer. Lumma Stealer is available for purchase on underground forums with different plans offering varied levels of access, ranging from log views to traffic analysis tools. The most costly plan permits buyers to access […]
The Reichsadler Cybercrime Group attempted to deploy ransomware on unpatched WS_FTP servers using a stolen LockBit 3.0 builder. The attackers used the GodPotato tool to escalate privileges on the servers.
Linux certifications test your ability to deploy and configure a Linux system in a business context. These certifications range from vendor-specific to distribution-agnostic. Several certification vendors provide specialization paths that enable candidates to pursue specific skill sets that match their job roles. IT professionals use certifications to add to their resumes to prove their knowledge […]