logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
  • How the combination of XDR and SIEM can improve SOC operations
  • MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
  • Cybercriminals Exploit Legitimate Websites for Credit Card Theft
  • Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33642 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33641 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33640 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33643 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33628 (magic_r300-2100m_firmware) 31 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Spectre v4.0: the speed of malware threats after the pandemics – Yoroi

Posted on 22 October 2021

From yoroi.company

While the first versions of this malware appeared in 2017, only during 2021 its developers heavily worked on the malware code. Three major version changes were observed just in the past few months

Read more…

Posted in News

Post navigation

Previous post: Government Agents Compromise REvil Backups to Force Group Offline
Next post: How to Install SVN on RHEL-Based Linux Distributions
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.