Skip to content
Close
CERTStation Blog CERTStation Blog

Cyber Security Dashboard

Friday, May 9, 2025
Menu
  • Home
  • Products
  • Blog
  • Contact Us
Search
CERTStation Blog CERTStation Blog

Cyber Security Dashboard

  • Home
  • Products
  • Blog
  • Contact Us

Month: August 2020

  • Home
  • 2020
  • August

Emotet Botnet Uses New Template for Malicious Attachments

By CertX August 31, 2020
Malware

In August, the Emotet botnet operators began using a new template, named ‘Red Dawn,’ for the malevolent attachments used in new operations. The Emotet malware returned in July 2020, following a five-month hiatus, and started vomiting huge amounts of malicious spam across the globe. These spam operations pretend to be invoices, shipping information, COVID-19 Continue Reading

Ryuk joins ransomware gangs running data leak websites

By CertX August 26, 2020
Cyber Crime

For large ransom groups, creating so-called “leak sites” has become a major strategy in order to upload and leak important documents from firms who decline to pay the ransomware decryption fee. These sites are part of a new inclination founding on the cybercriminal underground where ransomware groups are espousing a Continue Reading

Unskilled threat actors from Iran behind recent attacks with Dharma ransomware

By CertX August 25, 2020
Cyber Crime

A group of newbie threat actors from Iran that has been carrying out attacks against companies in Asia and trying to encode their networks with a version of the Dharma ransomware. Cyber-security company Group-IB, which identified the group, has said that the hackers have targeted companies located in Russia, Japan, China, and India. Continue Reading

Hackers and Their Types

By CertX August 24, 2020September 10, 2020
Miscellaneous

Who is a Hacker? Although the word “hacker” generally has a negative connotation, a hacker is not always a bad individual. A hacker is only a person who uses computer programming or special techniques to get over a challenge or problem. Hackers may be driven by a number of reasons, Continue Reading

Malicious local users may exploit shared memory flaw in IBM Db2

By CertX August 21, 2020
Security Updates

Nefarious local users are likely to exploit shared memory flaw that IBM fixed in its Db2 data management products, leading to information disclosure. Tracked as CVE-2020-4414, the flaw was exposed by researchers from Trustwave, which is caused by the dearth of overt memory protections for the shared memory used by Db2 Continue Reading

Posts navigation

1 2 … 4 Next

Categories

  • Company News22
  • Cyber Crime191
  • IoT1
  • Malware61
  • Miscellaneous131
  • SCADA3
  • Vulnerability Alerts275

Malware

Malware

Archives

CERTStation’s services and products are not endorsed, authorized or sponsored by,nor affiliated with, Carnegie Mellon University, the Software Engineering Institute or the CERT Coordination Center. – An Arpatech Venture.

Useful Links

  • Home
  • Products
  • Blog
  • Contact Us

Connect With Us

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

Email News Letter

  • TMA Subscription
© 2019 Certstation. All rights reserved.