CyCraftのリサーチチームによる最新の技術研究報告
In April 2020, highly malicious cyber activity was detected in several Taiwan government agencies. In one environment alone, out of the thousands of endpoints scanned, 30 endpoints were confirmed to be infected, and 10 high-risk endpoints were connected by these compromised endpoints. 10 key malware were discovered during these sophisticated targeted attacks — most of them were Waterbear Loader malware.
CVE-2020–1472 is ranked Critical 10/10 CVSSv3. The August 2020 Patch Tuesday warned that the flaw is present in most supported versions of Windows Server, from Server 2008 through Server 2019.
In cybersecurity, there have been several approaches used to track and analyze the various characteristics of cyber intrusions by advanced threat actors.
The COVID-19 pandemic has led to a worldwide social distancing experiment, spiking sales of remote working tools, personal protective equipment, hand sanitizer, toiletries, guns, drugs, alcohol, and much more.
In 2019, I discovered multiple vulnerabilities in QNAP Photo Station and CGI programs. These vulnerabilities can be chained into a pre-auth root RCE, which means an attacker could run code as root remotely without logging in. CyCraft was able to find this bug by giving its researchers 10% of their work time to bug hunting and bounties to keep their skills sharp and relevant.
The COVID-19 pandemic has led to a worldwide work-from-home experiment spiking the sales of laptops and video conferencing software around the world. Zoom’s UI-focused design goal to remove user friction in video conferencing allowed Zoom.us to become the 6th most used site in America and the 18th most used site globally, Alexa reports.
本ウェブサイトではウェブサイトの機能の最適化、性能分析及びパーソナライズされた体験と広告をご提供するためCookieを使用しています。より多くのCookieについての情報は、プライバシーポリシーをご参照ください。