Zephyrnet Logo

Tag: privilege escalation

RansomHub Actors Exploit ZeroLogon Vuln in Recent Ransomware Attacks

In recent attacks involving the ominously growing RansomHub ransomware, attackers have exploited the so-called ZeroLogon flaw in the Windows Netlogon Remote Protocol from 2020...

Top News

Jamf Gives Enterprise IT Security and Compliance Tools

Enterprise IT teams responsible for managing Macs and iOS devices are getting new compliance and security tools, device management company Jamf said during its...

Cisco IOS Bugs Allow Unauthenticated, Remote DoS Attacks

Cisco has released security updates for its flagship IOS and IOS XE operating system software for networking gear, as well as patches for its...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations this year. Indeed, network analysis...

Attackers Exploit Microsoft Security-Bypass Zero-Day Bugs

Microsoft's scheduled Patch Tuesday security update for February includes fixes for two zero-day security vulnerabilities under active attack, plus 71 other flaws across a...

Raspberry Robin Jumps on 1-Day Bugs to Nest Deep in Windows Networks

The Raspberry Robin worm is incorporating one-day exploits almost as soon as they're developed, in order to improve on its privilege escalation capabilities. Researchers from...

How Raspberry Robin Exploits 1-Day Bugs to Infiltrate Windows Networks

Title: Raspberry Robin: Exploiting 1-Day Bugs to Infiltrate Windows Networks Introduction: In the world of cybersecurity, hackers are constantly finding new ways to exploit vulnerabilities in...

Executing Zero Trust in the Cloud Takes Strategy

Zero trust is a high-level strategy that assumes that individuals, devices, and services attempting to access company resources, both externally and internally, can't automatically...

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Critical Vulns Found in Ray Open Source Framework for AI/ML Workloads

Organizations using Ray, the open source framework for scaling artificial intelligence and machine learning workloads, are exposed to attacks via a trio of as...

A Detection and Response Benchmark Designed for the Cloud

The speed and sophistication of cloud attacks have rapidly narrowed the time security teams have to detect and respond before suffering a breach. According...

Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation

Microsoft released fixes for a total of 63 bugs in its November 2023 update, including three that threat actors are actively exploiting already and...

Ransomware Mastermind Uncovered After Oversharing on Dark Web

When researchers responded to an ad to join up with a ransomware-as-a-service (RaaS) operation, they wound up in a cybercriminal job interview with one...

Latest Intelligence

spot_img
spot_img