all InfoSec news
Windows Defender exploited by LockBit ransomware
Aug. 1, 2022, 11:34 p.m. | SC Staff
SC Magazine feed for Threats www.scmagazine.com
Sentinel Labs researchers discovered that threat actors affiliated with the LockBit 3.0 ransomware operation have installed Cobalt Strike beacons on compromised systems through the exploitation of the Windows Defender command line tool "MpCmdRun.exe", BleepingComputer reports.
cybercrime defender lockbit lockbit ransomware malware ransomware windows windows defender
More from www.scmagazine.com / SC Magazine feed for Threats
New tool used in China-linked attacks against Asia-Pacific
2 days, 10 hours ago |
www.scmagazine.com
Bing ad posing as NordVPN aims to spread SecTopRAT malware
2 weeks, 5 days ago |
www.scmagazine.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Director, Threat and Attack Research
@ Singtel | Macquarie Park, Australia
Manager Information Security
@ Diebold Nixdorf | Remote, United States
Senior Analyst, IT Information Security
@ IHG | GA, United States
Eurizon Capital SGR - Compliance Senior Specialist
@ Intesa Sanpaolo | Milano, IT
Tier 1 Fusion Security Analyst
@ Nielsen | Bengaluru, India