ID | Votes | Profile Description |
---|---|---|
Printnightmare | 3 | PrintNightmare (CVE-2021-34527) is a significant vulnerability in the Windows Print Spooler service that allows an attacker to escalate privileges either locally or remotely by loading a malicious DLL which will be executed as SYSTEM. This flaw, potentially a new zero-day Microsoft vulnerability, en |
ID | Type | Votes | Profile Description |
---|---|---|---|
Conti | has used | 2 | Conti is a notorious malware and ransomware operation that has caused significant damage to computer systems worldwide. The Conti group, believed to have around 200 employees, operated like a regular business, with internal communications revealing the organization's structure and operations. It was |
ID | Type | Votes | Profile Description |
---|---|---|---|
Printnightmare Cve-2021-34527 | Unspecified | 3 | PrintNightmare (CVE-2021-34527) is a significant software vulnerability that was identified and reported in 2021. It is a flaw in the design or implementation of Microsoft's Windows Print Spooler service, which can be exploited for local and Windows Active Domain privilege escalation. This allows at |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
CISA | 4 months ago | #StopRansomware: Black Basta | CISA | |
InfoSecurity-magazine | 5 months ago | Russian APT28 Group in New “GooseEgg” Hacking Campaign | |
MITRE | 9 months ago | Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds | |
CERT-EU | a year ago | Windwos Print Spooler 权限提升漏洞 - FreeBuf网络安全行业门户 | |
Fortinet | a year ago | Ransomware Roundup - Black Basta | FortiGuard Labs | |
CERT-EU | a year ago | Top Threatening Network Vulnerability in 2023 | |
MITRE | 2 years ago | Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem | |
CERT-EU | a year ago | X-Force Prevents Zero Day from Going Anywhere | |
CERT-EU | a year ago | Cybersecurity threatscape: year 2021 in review |