rwth-security August 2024

rwth-security@lists.rwth-aachen.de
  • 1 participants
  • 44 discussions

GitHub comments abused to spread Lumma Stealer malware as fake fixes
by Bernd Kohler
2 months, 2 weeks

Insecure Platform Key (PK) used in UEFI system firmware signature
by Bernd Kohler
2 months, 2 weeks

Cyberattackers Exploit Google Sheets for Malware Control in Likely
by Bernd Kohler
2 months, 2 weeks

SANS Institute Unveils Critical Infrastructure Strategy Guide for
by Bernd Kohler
2 months, 2 weeks

Recon 2024: Automating Malware Deobfuscation with Binary Ninja
by Bernd Kohler
2 months, 2 weeks

BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave
by Bernd Kohler
2 months, 2 weeks

New QR Code Phishing Campaign Exploits Microsoft Sway to Steal
by Bernd Kohler
2 months, 2 weeks

Intel's Software Guard Extensions broken? Don't panic
by Bernd Kohler
2 months, 2 weeks

Attacks by malware abusing AppDomainManager Injection
by Bernd Kohler
2 months, 2 weeks

Agentic Security - open-source Agentic LLM Vulnerability Scanner
by Bernd Kohler
2 months, 2 weeks
Results per page: