News
CVE-2025-29824 exploited via PipeMagic malware escalated SYSTEM privileges, leading to targeted ransomware attacks.
Microsoft warns CVE-2025-29824 lets attackers with user access escalate privileges to deploy ransomware via a flaw in Windows ...
Microsoft says the RansomEXX ransomware gang has been exploiting a high-severity zero-day flaw in the Windows Common Log File ...
Not all EDR killers are malware. Talos incident responders came across one legitimate software tool called HRSword in a ...
This zero-day flaw is a privilege escalation bug in the Windows Common Log File System that can be exploited in order to ...
AttackIQ has released a new attack graph designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with CatB ransomware observed in its most recent activities, enabling defenders ...
Attackers are exploiting a zero-day vulnerability in the Windows Common Log File System to deploy ransomware against various ...
Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have discovered post-compromise ...
Ransomware threat actors are exploiting a zero-day vulnerability discovered in a highly-targeted Windows logging system tool ...
Macs are generally more secure than PCs, but they're no longer impenetrable fortresses. If you have a Mac, it can still be ...
The BlackSuit ransomware is known to target schools, healthcare systems, law enforcement facilities and other critical ...
The notorious cybercrime group Hunters International is dropping ransomware to focus on data theft and extortion.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results