Motivated miners

In recent months, multiple security vendors published articles about “motivated miners”—attackers who take advantage of tools, techniques, and procedures (TTPs) developed by advanced threat actors…

Read more

Confluence and WebLogic abuse

As early as April 10, 2019, unidentified attackers began leveraging new vulnerabilities in popular enterprise applications to deliver a wide variety of malware, including ransomware,…

Read more

CVE-2018-15982 exploit attacks

In late November 2018, a targeted attack against a medical institution in Russia exploited CVE-2018-15982, a zero-day remote code execution vulnerability in Adobe Flash Player. Adobe…

Read more