Gone are the days when a phishing page was a single page designed to capture user credentials. Phishing kits have become sophisticated and advanced to evade detection and look more legitimate to the user. In this blog, ..
https://www.zscaler.com/blogs/research/evolution-phishing-kits
Hiding in Plain Sight
Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old threats, such as spam. This often means pursuing cybercriminals wherever they congregate. However, instead of wheeling-and-dealing using hidden servers on ..
https://blog.talosintelligence.com/2019/04/hiding-in-plain-sight.html
Ongoing DNS hijacking campaign targeting consumer routers
Over the last three months, our honeypots have detected DNS hijacking attacks targeting various types of consumer routers. All exploit attempts have originated from hosts on the network of Google Cloud Platform (AS15169). In this campaign, we-ve identified four distinct rogue DNS servers being used to redirect ..
https://badpackets.net/ongoing-dns-hijacking-campaign-targeting-consumer-routers/
Rockwell Automation Stratix 5400/5410 and ArmorStratix 5700
This advisory includes mitigations for an uncontrolled resource consumption vulnerability reported in Rockwell Automations Stratix and ArmorStratix Ethernet switches.
https://ics-cert.us-cert.gov/advisories/ICSA-19-094-02
Rockwell Automation Stratix 5400/5410/5700/8000/8300 and ArmorStratix 5700
This advisory includes mitigations for resource management errors and improper input validation vulnerabilities reported in Rockwell Automations Stratix 5400/5410/5700/8000/8300 and ArmorStratix 5700 switches.
https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03