Skip to content

Ched Technology

Menu
  • Technology

Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways

By admin March 2, 2021 Technology 0 Comments
As part of Unit 42’s efforts to proactively monitor threats circulating in the wild, I recently came across new Hoaxcalls and Mirai botnet campaigns targeting a post-authentication Remote Code Execution vulnerability in Symantec Secure Web Gateway 5.0.2.8, which is a product...
[Continue reading...]

Goodbye Mworm, Hello Nworm: TrickBot Updates Propagation Module

By admin February 6, 2021 Technology 0 Comments
First discovered in 2016, TrickBot is an information stealer that provides backdoor access sometimes used by criminal groups to distribute other malware. TrickBot uses modules to perform different functions, and one key function is propagating from an infected Windows client to a...
[Continue reading...]

6 New Vulnerabilities Found on D-Link Home Routers

By admin February 5, 2021 Technology 0 Comments
On February 28, 2020, Palo Alto Networks’ Unit 42 researchers discovered six new vulnerabilities in D-Link wireless cloud routers running their latest firmware. The vulnerabilities were found in the DIR-865L model of D-Link routers, which is meant for home network use....
[Continue reading...]

Threat Assessment: Hangover Threat Group

By admin February 4, 2021 Technology 0 Comments
Unit 42 researchers recently published on activity by the Hangover threat group (aka Neon, Viceroy Tiger, MONSOON) carrying out targeted cyberattacks deploying BackConfig malware attacks against government and military organizations in South Asia. As a result, we’ve created this threat assessment report for...
[Continue reading...]

Rootless Containers: The Next Trend in Container Security

By admin February 3, 2021 Technology 0 Comments
As cloud computing evolves, containers continue to become more and more popular. New solutions and ideas to the way we implement containers are being introduced. One of these new ideas is rootless containers. Rootless containers is a new concept of containers...
[Continue reading...]

Updated BackConfig Malware Targeting Government and Military Organizations in South Asia

By admin February 2, 2021 Technology 0 Comments
Unit 42 has observed activity over the last 4 months involving the BackConfig malware used by the Hangover threat group (aka Neon, Viceroy Tiger, MONSOON). Targets of the spear-phishing attacks, using local and topical lures, included government and military organizations in South Asia....
[Continue reading...]

Cloud services for core platforms

By admin January 7, 2021 Technology 0 Comments
The simplest and fastest way to begin with IoT development is by using one of many available IoT platforms. Creating new and differentiated mobile services today is extremely challenging since it requires deep and elaborate integration into the cell network. A...
[Continue reading...]

Brief Article Teaches You the Ins and Outs of Apple’s Cloud and What You Should Do Today

By admin January 6, 2021 Technology 0 Comments
Brief Article Teaches You the Ins and Outs of Apple’s Cloud and What You Should Do Today When you click share, it’s going bring in a link you are able to send. So Android’s foreseeable future is cloudy but for the...
[Continue reading...]

All About Move Data in the Cloud

By admin January 5, 2021 Technology 0 Comments
Move Data in the Cloud Fundamentals Explained There are a number of ways the cloud is able to make your life simpler. Then you may determine what exactly does and doesn’t belong in the cloud step-by-step. Cloud and hybrid Organizations have...
[Continue reading...]

A Startling Fact about Microsoft Cloud Computing Technology Uncovered

By admin January 4, 2021 Technology 0 Comments
A Startling Fact about Microsoft Cloud Computing Technology Uncovered Cloud refers to a collection of scalable services a user can access via an online connection, preferably one with a greater bandwidth and very low latency. The cloud is also self-managed by...
[Continue reading...]

Posts navigation

1 2 3 … 5

NEW POST

  • Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways
  • Goodbye Mworm, Hello Nworm: TrickBot Updates Propagation Module
  • 6 New Vulnerabilities Found on D-Link Home Routers
  • Threat Assessment: Hangover Threat Group
  • Rootless Containers: The Next Trend in Container Security

Archives

  • March 2021
  • February 2021
  • January 2021
  • December 2020

Categories

  • Technology

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Ched Technology Copyright © 2021.
Theme by MyThemeShop. Back to Top ↑