• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From uptycs.com

Mallox Ransomware: Linux Variant Decryptor Found | Uptycs

0 2

Learn about the new Mallox ransomware variant targeting Linux. Discover its impact, technical analysis, and how to decrypt affected systems.

on Jul 3

From uptycs.com

Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation

0 0

Learn how the Log4j vulnerability (CVE-2021-44228) is exploited by XMRig cryptominer malware. Discover attack methods, indicators, and effective mitigation strategies.

on May 16

From uptycs.com

XZ Utils Backdoor Vulnerability (CVE-2024-3094): Comprehensive Guide

0 0

Explore the background, impact & mitigation steps for CVE-2024-3094, an XZ Utils backdoor affecting Linux & macOS: learn steps for detection & mitigation.

on Apr 8

From uptycs.com

Remote Code Execution: Proactive Measures to Secure Your AWS Cloud

0 0

Remote Code Execution (RCE): explore essential strategies to enhance your AWS cloud security & protect against RCE threats.

on Mar 19

From uptycs.com

Apache Struts Vulnerability CVE-2023-50164 | CSA

0 0

The Apache Struts vulnerability CVE-2023-50164, with a critical CVSS score of 9.8, poses a significant threat to a wide range of industries.

on Mar 7

From uptycs.com

EC2-Instance-Connect Lateral Movement Strategy for Data Exfiltration

0 0

Explore lateral movement in cloud security and how to combat EC2 instance connect vulnerabilities. Fortify against complex threats in AWS, Azure, and GCP.

on Mar 4

From uptycs.com

8220 Gang Cyber Threats: Cloud Infrastructure & Cryptomining Tactics

0 0

Read about the new 8220 Gang cyber threat targeting cloud based infrastructure & learn about their sophisticated cryptomining tactics & evasion techniques.

on Mar 1

From uptycs.com

UAC-0050 Remcos RAT: Pipe Method Used for Evasion in Ukraine Attack

0 0

Explore UAC-0050's latest cyber-attacks on Ukraine using RemcosRAT and sophisticated 'pipe method', signaling an escalation in cyber-espionage tactics.

on Jan 3

From uptycs.com

Uptycs Cybersecurity Standup

0 0

Stay up-to-date in the world of cybersecurity with Uptycs' Cybersecurity Stand Up livestream events covering a variety of critical topics.

on Dec 13

From uptycs.com

CVE-2023-46214: the Splunk Remote Code Execution (RCE) Vulnerability

0 0

Take a deep dive into the critical CVE-2023-46214 RCE vulnerability in Splunk, learn about its exploitation & find out how to stay secure.

on Nov 28

From uptycs.com

WinRAR CVE-2023-38831 Vulnerability: Malware Exploits & APT Attacks

0 0

WinRAR Zero-Day Vulnerability (CVE-2023-38831): APT groups exploit file extension handling flaws to execute malicious unauthorized code.

on Nov 18

From uptycs.com

GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel

0 0

Explore GhostSec's GhostLocker Ransomware-as-a-Service (RaaS): from hacktivist roots to Israel cyberattacks; featuring Uptycs' technical insights.

on Nov 3

From uptycs.com

Unified CNAPP and XDR | Uptycs

0 0

Uptycs, the first unified CNAPP and XDR solution, reduces risk from threats, vulnerabilities and misconfigurations all from a single UI and data model.

on Nov 3

From uptycs.com

CVE-2023-4911 Looney Tunables Exploit: Linux GLIBC Vulnerability

0 1

Explore the CVE-2023-4911 Looney Tunables exploit, a significant flaw in the Linux GLIBC_TUNABLES feature: impact, detection methods & preventive measures

on Oct 26

From uptycs.com

Quasar RAT's Dual DLL Sideloading Technique

0 0

The Quasar RAT employed a novel technique known as DLL side-loading, designed to drop, deploy, and execute malicious payloads without raising suspicions.

on Oct 23