• img June 04, 2020

ZLoader-Laced Emails Target Unemployed Victims

This post was originally published on this siteResearchers are warning of spear-phishing emails with CV lures that spread the ZLoader malware, which steals banking credentials from victims.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/zloader-laced-emails-target-unemployed-victims/

Read More
  • img June 03, 2020

Sophisticated Info-Stealer Targets Air-Gapped Devices via USB

This post was originally published on this siteThe newly discovered USBCulprit malware is part of the arsenal of an APT known as Cycldek, which targets government entities.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/sophisticated-info-stealer-targets-air-gapped-devices-via-usb/

Read More
  • img June 03, 2020

Attackers Target 1M+ WordPress Sites To Harvest Database Credentials

This post was originally published on this siteAn attack over the weekend unsuccessfully targeted 1.3 million WordPress websites, in attempts to download their configuration files and harvest database credentials.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/attackers-target-1m-wordpress-sites-to-harvest-database-credentials/

Read More
  • img June 03, 2020

TrickBot Adds BazarBackdoor to Malware Arsenal

This post was originally published on this siteThe stealthy backdoor is delivered via mass-market phishing emails that are well-crafted to appear convincing.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/trickbot-adds-bazarbackdoor-to-malware-arsenal/

Read More
  • img June 03, 2020

Critical SAP ASE Flaws Allow Complete Control of Databases

This post was originally published on this siteResearchers warn of critical flaws in SAP’s Sybase Adaptive Server Enterprise software.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/critical-sap-ase-flaws-allow-complete-control-of-databases/

Read More