#greatresearch — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #greatresearch, aggregated by home.social.
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
ToolShell: a story of five vulnerabilities in Microsoft SharePoint – Source: securelist.com https://ciso2ciso.com/toolshell-a-story-of-five-vulnerabilities-in-microsoft-sharepoint-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #zerodayvulnerabilities #microsoftsharepoint #CyberSecurityNews #vulnerabilities #GReATresearch #securelistcom #ToolShell
-
ToolShell: a story of five vulnerabilities in Microsoft SharePoint – Source: securelist.com https://ciso2ciso.com/toolshell-a-story-of-five-vulnerabilities-in-microsoft-sharepoint-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #zerodayvulnerabilities #microsoftsharepoint #CyberSecurityNews #vulnerabilities #GReATresearch #securelistcom #ToolShell
-
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia – Source: securelist.com https://ciso2ciso.com/ghostcontainer-backdoor-malware-compromising-exchange-servers-of-high-value-organizations-in-asia-source-securelist-com/ #rssfeedpostgeneratorecho #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftExchange #Targetedattacks #GhostContainer #GReATresearch #securelistcom #opensource #backdoor #Malware
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721 – Source: securelist.com https://ciso2ciso.com/analysis-of-the-latest-mirai-wave-exploiting-tbk-dvr-devices-with-cve-2024-3721-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #Secureenvironment(IoT) #MalwareTechnologies #CyberSecurityNews #internetofthings #vulnerabilities #DataEncryption #GReATresearch #securelistcom #Honeypot #botnets #Malware #LINUX #Mirai #CVE #RC4