Russian Group Forest Blizzard Deploying GooseEgg Tool to Exploit CVE-2022-38028
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler
Europol and a collection of UK law enforcement agencies have disrupted the LabHost phishing platform, which targeted victims
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
Days after a takedown operation, the Trickbot botnet is back up and running with new C2 servers in Europe and South America.
A critical flaw in SonicOS could lead to remote code execution in vulnerable SonicWall firewall appliances.
The newly identified FIN11 group uses the Clop ransomware and various public malware tools in operations against companies around the world.
A flaw (CVE-2020-16898) in Windows 10 and Server 2019 can allow remote code execution with one malformed ICMP packet.
Microsoft and several other security companies worked together to disrupt the Trickbot malware network, seizing C2 servers and disabling IP addresses associated with it.