There are plans to update the BlueKeep Metasploit exploit after recent investigations revealed that the exploit triggers the blue screen of death in devices. This comes after recent reports of BlueKeep being used to install cryptocurrency miners on vulnerable
Another company has disclosed that that they were hit by a ransomware attack, this time involving the encryption of the customer data of SmarterASP.net, a popular hosting service provider for ASP.NET.
We have developed a machine learning model called TrendX Hybrid Model that uses two training phases — pre-training and training — and allows us to correlate static and behavior features to improve detection rates and reduce false positives.
Researchers discovered a vulnerability in Amazon’s Ring Video Doorbell Pro that, if exploited, could allow a threat actor to get network or Wi-Fi credentials.
An Android bug allows threat actors to transfer a malicious application to a nearby Near Field Communication (NFC)-enabled device via the Android Beam.
Details on the proof-of-concept (PoC) exploit for two unpatched, critical remote code execution (RCE) vulnerabilities in the network configuration management utility rConfig have been recently disclosed.
Patch now: Two Chrome zero-days were reported, one of them actively exploited in a campaign. Meanwhile, BlueKeep was initially reported seen in the wild to install a malicious Monero miner.
Almost 4,000 domains and 62 phishing kit variants used to target Microsoft users were uncovered within an observation window of 262 days, according to new report.
Trend Micro’s Zero Day Initiative (ZDI) will bring industrial control system (ICS) hacking into the Pwn2Own competition. The categories will be based on how widely used the system is and the relevance to researchers and the ICS community.