In the third and final part of this series, we will explore Cerber, the most devious ransomware, and its behavior. Red Cerber:  The campaign of Red Cerber started in early 2017 after a small break. Developers of Cerber came up with a new and deadly version which had some improvements in its behavior. It noticeably changes […]

Read More →

Let’s continue from where we left off last week, and will go through the behavior patterns of the next versions of the Cerber Ransomware. Cerber3.0: Cerber3.0 RIG-V exploit kit is an updated version of Cerber2.0. After the release of Cerber2, security vendors released some decryptors to decrypt the files that were encrypted by the ransomware. […]

Read More →

The Model-View-Framework Apache Struts2, an open source and free framework for simplifying the creation of web applications in Java has been recently patched to mitigate a zero day vulnerability. Apache Struts2 is been affected with a new vulnerability which is being actively exploited in the wild. The vulnerability is a possible Remote Code Execution which […]

Read More →

(Image source: WordPress ) WordPress the easiest, one of the most powerful blogging and website content management system has silently fixed a dangerous vulnerability in WordPress REST API Endpoint which was recently added to WordPress version 4.7.0 and enabled by default. The REST API has been affected by an unauthenticated privilege escalation vulnerability, that could possibly lead to […]

Read More →

Adobe has released three security updates for Adobe Flash Player (APSB17-04), Adobe Digital Editions (APSB17-05), and Adobe Campaign (APSB17-06) which covers a total of 24 CVEs. These updates for Adobe Flash Player address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. For Digital Editions it resolves a critical heap buffer overflow vulnerability that could lead to […]

Read More →