Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks

Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks

The cybersecurity firm, CrowdStrike has warned that Chinese hackers are using the Log4Shell exploit tools to perform various post-exploitation operations. 
Hackers Exploiting Log4j2 Vulnerability in The Wild To Deploy Ransomware

Hackers Exploiting Log4j2 Vulnerability in The Wild To Deploy Ransomware

An emergency security update has been released recently by the Apache Software Foundation to fix a 0-day vulnerability in the popular Log4j...
Hackers Are Exploiting a Flaw in Popular Billing Software to Deploy Ransomware

Hackers Are Exploiting a Flaw in Popular Billing Software to Deploy Ransomware

In various versions of the popular BQE Software BillQuick billing solution, the security analysts of Huntress Labs have warned of a critical...
U.S. Cyber Command Warns of Active Mass Exploitation Attempts Targeting Confluence Flaws

U.S. Cyber Command Warns of Active Mass Exploitation Attempts Targeting Confluence Flaws

The cybersecurity authorities of the U.S. Cyber command have recently been notified regarding the increase in the number of scans and attempts...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security