all InfoSec news
Iranian Hackers 'Ballistic Bobcat' Deploy New Backdoor
Sept. 12, 2023, 9:10 p.m. |
GovInfoSecurity.com RSS Syndication www.govinfosecurity.com
Hackers aligned with the Iranian state are targeting vulnerable Microsoft Exchange Servers to deploy a new malware backdoor that has already victimized over two dozen Israeli organizations as part of an ongoing espionage campaign. Hackers' initial access point into systems likely was ProxyLogon.
access access point backdoor ballistic bobcat campaign deploy espionage exchange exploited hackers initial access iranian iranian hackers israeli malware microsoft microsoft exchange organizations point proxylogon servers state systems targeting vulnerable
More from www.govinfosecurity.com / GovInfoSecurity.com RSS Syndication
New Report Exposes Iranian Hacking Group's Media Masquerade
2 days, 19 hours ago |
www.govinfosecurity.com
How Intel 471's Buy of Cyborg Is Reshaping Threat Hunting
2 days, 19 hours ago |
www.govinfosecurity.com
Web Trackers Persist in Healthcare Despite Privacy Risks
2 days, 21 hours ago |
www.govinfosecurity.com
New Botnet 'Goldoon' Targets D-Link Devices
2 days, 21 hours ago |
www.govinfosecurity.com
Jobs in InfoSec / Cybersecurity
Consultant infrastructure sécurité H/F
@ Hifield | Sèvres, France
SOC Analyst
@ Wix | Tel Aviv, Israel
Information Security Operations Officer
@ International Labour Organization | Geneva, CH, 1200
PMO Cybersécurité H/F
@ Hifield | Sèvres, France
Third Party Risk Management - Consultant
@ KPMG India | Bengaluru, Karnataka, India
Consultant Cyber Sécurité H/F - Strasbourg
@ Hifield | Strasbourg, France