From uptycs.com
Mallox Ransomware: Linux Variant Decryptor Found | Uptycs
0 2
Learn about the new Mallox ransomware variant targeting Linux. Discover its impact, technical analysis, and how to decrypt affected systems.
on Jul 3
From uptycs.com
Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation
0 0
Learn how the Log4j vulnerability (CVE-2021-44228) is exploited by XMRig cryptominer malware. Discover attack methods, indicators, and effective mitigation strategies.
on May 16
From uptycs.com
XZ Utils Backdoor Vulnerability (CVE-2024-3094): Comprehensive Guide
0 0
Explore the background, impact & mitigation steps for CVE-2024-3094, an XZ Utils backdoor affecting Linux & macOS: learn steps for detection & mitigation.
on Apr 8
From uptycs.com
Remote Code Execution: Proactive Measures to Secure Your AWS Cloud
0 0
Remote Code Execution (RCE): explore essential strategies to enhance your AWS cloud security & protect against RCE threats.
on Mar 19
From uptycs.com
Apache Struts Vulnerability CVE-2023-50164 | CSA
0 0
The Apache Struts vulnerability CVE-2023-50164, with a critical CVSS score of 9.8, poses a significant threat to a wide range of industries.
on Mar 7
From uptycs.com
EC2-Instance-Connect Lateral Movement Strategy for Data Exfiltration
0 0
Explore lateral movement in cloud security and how to combat EC2 instance connect vulnerabilities. Fortify against complex threats in AWS, Azure, and GCP.
on Mar 4
From uptycs.com
8220 Gang Cyber Threats: Cloud Infrastructure & Cryptomining Tactics
0 0
Read about the new 8220 Gang cyber threat targeting cloud based infrastructure & learn about their sophisticated cryptomining tactics & evasion techniques.
on Mar 1
From uptycs.com
UAC-0050 Remcos RAT: Pipe Method Used for Evasion in Ukraine Attack
0 0
Explore UAC-0050's latest cyber-attacks on Ukraine using RemcosRAT and sophisticated 'pipe method', signaling an escalation in cyber-espionage tactics.
on Jan 3
From uptycs.com
0 0
Stay up-to-date in the world of cybersecurity with Uptycs' Cybersecurity Stand Up livestream events covering a variety of critical topics.
on Dec 13
From uptycs.com
CVE-2023-46214: the Splunk Remote Code Execution (RCE) Vulnerability
0 0
Take a deep dive into the critical CVE-2023-46214 RCE vulnerability in Splunk, learn about its exploitation & find out how to stay secure.
on Nov 28
From uptycs.com
WinRAR CVE-2023-38831 Vulnerability: Malware Exploits & APT Attacks
0 0
WinRAR Zero-Day Vulnerability (CVE-2023-38831): APT groups exploit file extension handling flaws to execute malicious unauthorized code.
on Nov 18
From uptycs.com
GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel
0 0
Explore GhostSec's GhostLocker Ransomware-as-a-Service (RaaS): from hacktivist roots to Israel cyberattacks; featuring Uptycs' technical insights.
on Nov 3
From uptycs.com
Unified CNAPP and XDR | Uptycs
0 0
Uptycs, the first unified CNAPP and XDR solution, reduces risk from threats, vulnerabilities and misconfigurations all from a single UI and data model.
on Nov 3
From uptycs.com
CVE-2023-4911 Looney Tunables Exploit: Linux GLIBC Vulnerability
0 1
Explore the CVE-2023-4911 Looney Tunables exploit, a significant flaw in the Linux GLIBC_TUNABLES feature: impact, detection methods & preventive measures
on Oct 26
From uptycs.com
Quasar RAT's Dual DLL Sideloading Technique
0 0
The Quasar RAT employed a novel technique known as DLL side-loading, designed to drop, deploy, and execute malicious payloads without raising suspicions.
on Oct 23