all InfoSec news
Iranian Hackers 'Ballistic Bobcat' Deploy New Backdoor
Sept. 12, 2023, 9:10 p.m. |
GovInfoSecurity.com RSS Syndication www.govinfosecurity.com
Hackers aligned with the Iranian state are targeting vulnerable Microsoft Exchange Servers to deploy a new malware backdoor that has already victimized over two dozen Israeli organizations as part of an ongoing espionage campaign. Hackers' initial access point into systems likely was ProxyLogon.
access access point backdoor ballistic bobcat campaign deploy espionage exchange exploited hackers initial access iranian iranian hackers israeli malware microsoft microsoft exchange organizations point proxylogon servers state systems targeting vulnerable
More from www.govinfosecurity.com / GovInfoSecurity.com RSS Syndication
ISMG Editors: Is SASE Living Up to the Hype in 2024?
1 day, 11 hours ago |
www.govinfosecurity.com
Hacker Sells Apparent Santander Bank Customer Data
1 day, 11 hours ago |
www.govinfosecurity.com
Senator Urges FTC, SEC to Investigate UHG's Cyberattack
1 day, 11 hours ago |
www.govinfosecurity.com
First-Party Fraud's Big Comeback in Banking and Lending
1 day, 13 hours ago |
www.govinfosecurity.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)