CVE-2020-1472 – ‘Zerologon’ Vulnerability
CVE-2020-1472 was discovered by researchers at Secura, nicknamed ‘Zerologon’, and is a vulnerability in Netlogon that could allow attackers to hijack Windows domain controller. While... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
CVE-2020-1472 was discovered by researchers at Secura, nicknamed ‘Zerologon’, and is a vulnerability in Netlogon that could allow attackers to hijack Windows domain controller. While... Read More
According to the press statement made by the company from Bluetooth, regarding the exploitation of Bluetooth devices through Cross-Transport Key Derivation, this was discovered by... Read More
SMAUG is another offering in the RaaS category, Ransomware as a Service. SMAUG offers support for both victims and users across all OS platforms with... Read More
GhostDNS is a platform developed to help attackers find vulnerable SOHO routers and change the DNS settings of the ones found to be vulnerable to... Read More
Over the past few weeks researchers have been monitoring new activity of the Evilnum group. Evilnum first appeared in 2018, targeting different financial technology companies... Read More
The Joker malware, first discovered in 2017, has once again made news as cybersecurity researchers have discovered six apps on the Google Play store that... Read More
Researchers at ESET have discovered a new malware family they have code-named ‘KryptoCibule,’ with activity dating back to December of 2018. This malware is a... Read More
Lemon_Duck cryptominer is one of the most advanced cryptojackers out there. It is being continuously developed with new threat vectors and evasion techniques to bypass... Read More
China-based ad network, Mintegral, has been accused of spying on user activity and commiting ad fraud in more than a thousand IOS apps. Headquartered in... Read More
Cetus is a new and improved docker cryptojacking worm mining for Monero. Unit 42 from Palo Alto networks discovered Cetus using a Docker daemon honeypot.... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..