article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2017-0144.

Malware 74
article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Typically malware gets […].

Malware 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. Navigating an exceptionally complex landscape, CISOs are having to do more with less and risk personal legal exposure,” reads a blog post about the report. “The 6 - CISA and FBI issue warning about Androxgh0st malware Is the Androxgh0st malware on your radar screen?

article thumbnail

COVID-19: Coronavirus Fears Seized by Cybercriminals

Tenable

Malware and phishing campaigns use global interest in the novel coronavirus to capitalize on fear and uncertainty around the pandemic. Coronavirus-themed malware campaigns. IBM’s X-Force team compiled some indicators of compromise on January 29 and published a summary blog post on February 5. Image source: Proofpoint blog.

Malware 112
article thumbnail

October Patch Tuesday 2022

Ivanti

For that purpose, I am starting the October Patch Tuesday blog post with one of my favorite cybersecurity tips regarding passwords and will be providing additional cybersecurity tips throughout the blog post: “Passwords are like underwear: keep them private, make them exotic and change them on a regular basis!”. Zero day vulnerability.

article thumbnail

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware

Tenable

The actors have also used trojan versions of X-Popup, a messenger application used in several smaller hospitals in South Korea and have spread malware using 2 malicious domains, xpopup.pe[.]kr Additionally, Tenable has plugin coverage for the CVEs discussed in this blog. billion has been stolen or extorted. kr and xpopup[.]com.

Malware 53
article thumbnail

AA23-215A: 2022's Top Routinely Exploited Vulnerabilities

Tenable

Analysis As we examined the list of 42 CVEs in the CSA, many have been featured in past blogs and alerts from Tenable Research as well as included in our 2020 , 2021 and 2022 TLR. This blog post was published on August 3 and reflects VPR at that time. CVE Description CVSSv3 VPR CVE-2017-0199 Microsoft Office/WordPad RCE 7.8