May’s Patch Tuesday haul touches a six-pack of product families
Credit to Author: Angela Gunn| Date: Tue, 09 May 2023 19:27:52 +0000
A relatively light month by the numbers, but several patches require extra effort to deploy
Read moreCredit to Author: Angela Gunn| Date: Tue, 09 May 2023 19:27:52 +0000
A relatively light month by the numbers, but several patches require extra effort to deploy
Read moreCategories: Exploits and vulnerabilities Categories: News Tags: Microsoft Tags: CVE-2023-29336 Tags: CVE-2023-24932 Tags: bootkit Tags: CVE-2023-29325 Tags: Outlook Tags: preview Tags: CVE-2023-24941 Tags: Apple Tags: Cisco Tags: Google Tags: Android Tags: VMWare Tags: SAP Tags: Mozilla Microsoft’s Patch Tuesday round up for May 2023 includes patches for three zero-day vulnerabilities and one critical remote code execution vulnerability |
The post Update now! May 2023 Patch Tuesday tackles three zero-days appeared first on Malwarebytes Labs.
Read moreCredit to Author: Microsoft Security Threat Intelligence – Editor| Date: Tue, 11 Apr 2023 17:00:00 +0000
This guide provides steps that organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2022-21894 via a Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus.
The post Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign appeared first on Microsoft Security Blog.
Read moreCredit to Author: Malwarebytes Labs| Date: Thu, 04 Oct 2018 15:00:00 +0000
Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines. Categories: Tags: bootkitLojackLojaxUFEIXAgent |
The post LoJack for computers used to attack European government bodies appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 21:00:22 +0000
Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign. Categories: Tags: bootkitcryptominerdrive-by attackexploithidden beehidden bee minerMBR |
The post ‘Hidden Bee’ miner delivered via improved drive-by download toolkit appeared first on Malwarebytes Labs.
Read more