• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Volexity

OceanLotus Uses Malware to Attack MacOS Systems

April 20, 2018 By News Team Leave a Comment

A new backdoor has been discovered by researchers at Trend Micro, which attacks MacOS systems, and is likely linked to the OceanLotus threat group. The cybersecurity firm, in a recent blog post, said the backdoor it dubbed OSX_OCEANLOTUS.D, … [Read more...] about OceanLotus Uses Malware to Attack MacOS Systems

Filed Under: Uncategorized Tagged With: APT, backdoor, C&C, Cambodia, dropper, HDMC, Laos, MacOS, OceanLotus, Perl, Philippines, Trend Micro, Vietnam, Vietnam-based APT group, Volexity

Drupal Vulnerable to Back Doors

April 20, 2018 By News Team Leave a Comment

On March 28th, a patch for a vulnerability on Drupal was released to protect the Drupal content management system (Drupal 6, 7 and 8) against the bug that facilitates remote code execution. The Drupal vulnerability was tracked as CVE-2018-7600 and … [Read more...] about Drupal Vulnerable to Back Doors

Filed Under: Vulnerabilities Tagged With: automated attacks, backdoors, CVE-2018-7600, Druid, Drupal, Drupal 6, Drupal 7, Drupal 8, Drupal websites, Drupalgeddon 2, Imperva, patches, proof-of-concept exploit, SANS Internet Storm Center, Volexity

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.