Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Attackers are Actively Exploiting Recent Vulnerabilities Found in F5 BIG-IP

This one goes in the “this is why patching is important” file and highlights the need to be able to quickly apply patches for critical flaws found in different devices and software. After the disclosure of a critical vulnerability tracked as CVE-2022-1388 (CVSS 9.8) that was identified in multiple versions of F5’s BIG-IP operating system complete with patches last week. We have already seen researchers develop POC code for it and now hear that attackers are actively exploiting the flaw in the wild.

Details
By Wiley Sikes
Wiley Sikes
May 09
Hits: 1842
  • Security
  • Exploit
  • Vulnerability
  • bigip
  • f5
  • cve20221388

Read more: Attackers are Actively Exploiting Recent...

No comments on “Attackers are Actively Exploiting Recent Vulnerabilities Found in F5 BIG-IP”
Security Talk

New Advanced Fileless Malware Found Using Windows Event Logs

When most people think of malware, they think of binaries that are downloaded to a drive and executed. However, that is only part of the malware world. The other side does not actually download the malicious binary directly to the drive and often injects it directly into memory though the use of scripts. The name fileless is a bit of a misnomer as there are always files to be found in different stages of the attack, it is more to the point that much of the malicious work is doe through injection of code into legitimate processes without the need to write much of it to disk.

Details
By Sean Kalinich
Sean Kalinich
May 09
Hits: 2042
  • Windows
  • Malware
  • cobalt strike
  • fileless malware
  • threat groups
  • silentbreak

Read more: New Advanced Fileless Malware Found Using...

No comments on “New Advanced Fileless Malware Found Using Windows Event Logs”
Security Talk

Ukrainian Hacktivists Hit Russia Where It Hurts, Alcohol.

Its seems that the efforts of Ukrainian hacktivists have decided to focus their efforts on a new and interesting target. In addition to other strategic targets, they have gone after one of the central portals for Russian alcohol distribution. The attack is currently manifested in the form of a distributed denial of service attack(s) targeting the portal to render it inaccessible. This means that distillers and distributors of alcoholic beverages are not able to get their products into consumers hands.

Details
By Sean Kalinich
Sean Kalinich
May 06
Hits: 1872
  • Security
  • DDos
  • Hacktivist
  • Hacktivism
  • ukraine
  • russia

Read more: Ukrainian Hacktivists Hit Russia Where It Hurts,...

No comments on “Ukrainian Hacktivists Hit Russia Where It Hurts, Alcohol.”
Security Talk

Another Bug Found in Android, This One Actively Exploited

in the wild. The patch for this bug is one of 37 that are part of the monthly security release which covers multiple components in the popular mobile OS. This comes at a time when mobile banking malware is on the rise and there are also concerns around threat groups targeting phones to compromise them for use in MFA request responses.

Details
By Sean Kalinich
Sean Kalinich
May 06
Hits: 1876
  • Android
  • Google
  • Security
  • Mobile Devices
  • Vulnerabilities
  • Patching
  • byod

Read more: Another Bug Found in Android, This One Actively...

No comments on “Another Bug Found in Android, This One Actively Exploited”
Security Talk

DLL Hijacking used Against Ransomware to Stop Encryption Process

The idea of DLL hijacking is a well known one and one that is used by attackers to compromise security tools and even sophisticated anti-malware solutions. DLLs (Dynamic Link Library) are not much more than static files that sit idle on a system until loaded. These libraries contain information that is important to the operation of the program calling it. If an attacker can replace a DLL with one of their own that prevents or alters the operation of the calling program, they have successfully hijacked it. Because of the flexibility and shared nature of DLL they are an easy target.

Details
By Sean Kalinich
Sean Kalinich
May 05
Hits: 1790
  • Ransomware
  • dllhijacking
  • dll
  • hyp3rlinx
  • malvuln

Read more: DLL Hijacking used Against Ransomware to Stop...

No comments on “DLL Hijacking used Against Ransomware to Stop Encryption Process”

More Articles …

  1. Chat Logs Expose Ransomware Groups Methods and Styles of Interactions with Victims
  2. Google Says they Will Fight Doxxing, With Some Conditions of Course
  3. Cloud Services Suffer the Same Issue as On Prem Services, they just Hide it Better
  4. Conti has a New Toy as Bumblebee Malware Replaces BazarLoader
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13

Page 9 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech