Conversion Hackers
Fealse: Tech News
CISA, Australia, Canada, New Zealand, & UK Issue Joint Advisory on Russian Cyber Threats
  • Security

APT Groups Swarming on VMware Servers with Log4Shell

  • June 24, 2022
  • admin
Total
0
Shares
0
0
0


Organizations with public-facing VMware Horizon and Unified Access Gateway (UAG) servers without appropriate Log4Shell mitigations have been under a barrage of attacks from a range of attackers, including state-sponsored advanced persistent threat (APT) actors.

In fact, a new Cybersecurity and Infrastructure Agency (CISA) alert tells organizations running servers without Log4Shell updates to just assume they’ve been compromised and proceed with threat hunting and incident response. CISA added that in one instance, APT attackers were able to breach a disaster recovery network, move laterally, and steal sensitive data.

“If potential compromise is detected, administrators should apply the incident response recommendations included in this CSA and report key findings to CISA,” the warning, issued along with the US Coast Guard Cyber Command (CGCYBER), said.

CISA also provides a list of indicators of compromise (IOC) and extensive technical details for threat hunters.

Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Subscribe

Total
0
Shares
Share 0
Tweet 0
Pin it 0
admin

Previous Article
SpaceX Rocket in the night sky
  • Photography

Lucky Photographer Captures SpaceX Rocket Shooting Across Night Sky

  • June 24, 2022
  • admin
View Post
Next Article
Memory Pak: After 20 Years, Eternal Darkness Really Deserves A Second Life
  • Games

Memory Pak: After 20 Years, Eternal Darkness Really Deserves A Second Life

  • June 24, 2022
  • admin
View Post
You May Also Like
Hackers Come Home to Vibrant Community
View Post
  • Security

Hackers Come Home to Vibrant Community

  • admin
  • August 15, 2022
Most Q2 Attacks Targeted Old Microsoft Vulnerabilities
View Post
  • Security

Most Q2 Attacks Targeted Old Microsoft Vulnerabilities

  • admin
  • August 15, 2022
Transitioning From VPNs to Zero-Trust Access Requires Shoring Up Third-Party Risk Management
View Post
  • Security

Transitioning From VPNs to Zero-Trust Access Requires Shoring Up Third-Party Risk Management

  • admin
  • August 15, 2022
Credential Theft
View Post
  • Security

Credential Theft Is (Still) A Top Attack Method

  • admin
  • August 15, 2022
The Industry Must Better Secure Open Source Code From Threat Actors
View Post
  • Security

How and Why to Apply OSINT to Protect the Enterprise

  • admin
  • August 15, 2022
Black Hat and DEF CON Roundup
View Post
  • Security

Black Hat and DEF CON Roundup

  • admin
  • August 15, 2022
SOVA Android Banking Trojan
View Post
  • Security

SOVA Android Banking Trojan Returns With New Capabilities and Targets

  • admin
  • August 15, 2022
Black Hat USA 2022: Burnout, a significant issue
View Post
  • Security

Black Hat USA 2022: Burnout, a significant issue

  • admin
  • August 15, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Apps
  • Games
  • How To
  • News
  • Photography
  • Reviews
  • Security

Input your search keywords and press Enter.