Remove 2015 Remove Blog Remove Malware Remove Windows
article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2015-5122.

Malware 75
article thumbnail

ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware – How Tenable Can Help

Tenable

In this blog post, we’ll offer background into Conti – one of the more prolific ransomware groups in operation today – dig into the leaked information, and offer concrete advice on how to protect your organization against Conti’s attacks. These include phishing, malware and brute force attacks against Remote Desktop Protocol.

Windows 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

COVID-19: Coronavirus Fears Seized by Cybercriminals

Tenable

Malware and phishing campaigns use global interest in the novel coronavirus to capitalize on fear and uncertainty around the pandemic. Coronavirus-themed malware campaigns. IBM’s X-Force team compiled some indicators of compromise on January 29 and published a summary blog post on February 5. Image source: Proofpoint blog.

Malware 112
article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

Although the malware was a never-before-seen mutation of the Qbot virus, our Behavioral Threat Protection (BTP) engine caught it. Fortunately, the Cortex XDR endpoint agent killed the malware as soon as the executable attempted to run. In case of shares protected by weak passwords, it will attempt brute-forcing via a dictionary attack.

article thumbnail

Microsoft Server 2008 End of Life : Now What?

CloudSphere

This date will also include SQL Server 2008 and Windows 7. Windows Server 2008 was an extremely successful product for Microsoft and served so many organizations well. For Windows Server 2008 and Server 2008 R2, this support level ended on January 13, 2015. Windows 7 and Server 2008 represent 85 percent of all infections.

Windows 40
article thumbnail

What Is VPR and How Is It Different from CVSS?

Tenable

This blog series will provide an in-depth discussion of vulnerability priority rating (VPR) from a number of different perspectives. At the time this blog post was written, there were more than 16,000 vulnerabilities rated as 9.0 Over 60,000 vulnerabilities have been rated by CVSSv3 since its release in June 2015. What is VPR?

article thumbnail

Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts

Tenable

Over the last few months, Tenable has published multiple blog posts analyzing recent FBI and CISA (Cybersecurity & Infrastructure Security Agency) alerts regarding nation-state groups 3 and APT actors 4 chaining together vulnerabilities against a number of government agencies and U.S. This isn’t a new trend. and abroad. . APT33 (Shamoon).

Malware 102