In a podcast discussion with Lindsey O'Donnell-Welch, Crane Hassold with Abnormal Security discusses how business email compromise attackers are getting savvier and best practices to defend against BEC attacks.
Researchers have found a Log4Shell-like flaw in the H2 database console, which allows remote code execution.
An unknown threat group is exploiting the Log4j vulnerability in VMware Horizon servers to install webshells for further malicious activity.
CISA said that thousands of internet-connected assets have been mitigated by federal agencies under its Emergency Directive that addressed the Log4j flaw.
A new lawsuit from Meta seeks to uncover the operators behind 39,000 phishing sites that have attempted to steal Facebook, Instagram and WhatsApp users' credentials.