#pipemagic — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #pipemagic, aggregated by home.social.
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Happy Wednesday everyone!
Today's #readoftheday starts strong! "Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC) have discovered post-compromise exploitation of a zero-day elevation of privilege vulnerability in the Windows Common Log File System (CLFS) against a small number of targets." and their discovery involved #PipeMagic malware which was used to deploy ransomware. Enjoy and Happy Hunting!
Exploitation of CLFS zero-day leads to ransomware activity
https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting