logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Understanding Partial File System Extraction: What Data Can and Cannot be Accessed on iOS 15.6-16.1.2 Devices
  • ChatGPT happy to write ransomware, just really bad at it
  • Microsoft Defender mistakenly tagging URLs as malicious
  • Microsoft planning to block outdated Exchange servers
  • 3CX Desktop Attack: Sophos Customer Information

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-1583 (linux_kernel) 24 March 2023
  • CVE-2023-26864 (smplredirectionsmanager) 24 March 2023
  • CVE-2023-25350 (faveo_helpdesk) 24 March 2023
  • CVE-2023-22812 (sandisk_privateaccess) 24 March 2023
  • CVE-2023-21079 (android) 24 March 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Emotet malware’s new ‘Red Dawn’ attachment is just as dangerous

Posted on 30 August 2020

From bleepingcomputer.com

Red Dawn

The Emotet botnet has begun to use a new template for their malicious attachments, and it is just as dangerous as ever.

After a five-month “vacation,” the Emotet malware returned in July 2020 and began to spew massive amounts of malicious spam worldwide.

Read more…

Posted in News

Post navigation

Previous post: Windows 10 21H1: The exciting features in next year’s major update
Next post: How to run Linux programs from a Windows 10 command prompt
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.