Articles

What you need to know about ransomware as a service attacks!

Ransomware attacks continue to be one of the main concerns for organizations. Cyber threat actors know the impact a successful ransomware attack represents for a company and continue to put efforts in developing their tools, techniques, tactics and procedure making huge profits out of their criminal activities. The business model of cyber-criminal groups involved in ransomware activities is in constant mutation and different groups implement...

Spring4Shell – Is this the new log4shell?

A new vulnerability was discovered in the Spring framework after a Chinese security researcher leaked a proof-of-concept (PoC) exploit on GitHub. This vulnerability affects Java Springcore and permits an attacker to perform a remote code execution. The vulnerability affects JDK 9 and higher. At the moment, there is no CVE and no official announcement from Spring at this time. When reading emerging documentation online, be careful to not confuse...