Browsing the "microsoft" Tag

Looking for that threat actor “likely based in Russia.” SolarLeaks and a probably bogus offer of stolen files. Notes on Patch Tuesday.

January 15th, 2021 📆 | 3658 Views ⚑

Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken

Tagged with:




‘SolarLeaks’ Site Claims to Offer Attack Victims’ Data

January 14th, 2021 📆 | 2865 Views ⚑

Cybercrime , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Advertised: Unverified Cache of Stolen Microsoft, Cisco, FireEye and

Tagged with:




IT cleanup at U.S. Capitol presents massive challenge — GCN

January 11th, 2021 📆 | 2947 Views ⚑

IT cleanup at U.S. Capitol presents massive challenge Federal IT staff have a massive job ahead of them cleaning up

Tagged with:




intentions, TTPs, and class action. Embassy Panda’s APT side hustle. Delisting Chinese telcos.

January 5th, 2021 📆 | 4649 Views ⚑

A ZDNet op-ed throws its hands up and declares the SolarWinds software supply chain cyberespionage campaign to be worse than

Tagged with:




SolarWinds hackers accessed Microsoft source code, the company says

January 1st, 2021 📆 | 6030 Views ⚑

By Raphael Satter, Joseph Menn WASHINGTON (Reuters) -The hacking group behind the SolarWinds compromise was able to break into Microsoft

Tagged with:




Prioritizing data backup to defend against ransomware threats — GCN

December 21st, 2020 📆 | 7613 Views ⚑

Industry Insight Prioritizing data backup to defend against ransomware threats By Nick Psaki Dec 21, 2020 There were nearly 200

Tagged with:




Microsoft Windows DrawIconEx Local Privilege Escalation ≈ Packet Storm

December 16th, 2020 📆 | 4961 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘msf/core/post/file’require ‘msf/core/exploit/exe’require ‘msf/core/post/windows/priv’ class MetasploitModule < Msf::Exploit::LocalRank = NormalRanking include

Tagged with: