Home VIRUS COM AR Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw VIRUS COM AR Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw By Admin - March 13, 2019 298 0 Share on Facebook Tweet on Twitter Newly patched CVE-2019-0797 is being actively exploited by two APTs, FruityArmor and SandCat. Source: Threadpost RELATED ARTICLESMORE FROM AUTHOR VIRUS COM AR Email crypto phishing scams: stealing from hot and cold crypto wallets VIRUS COM AR Andariel’s silly mistakes and a new malware family VIRUS COM AR How cybercrime is impacting SMBs in 2023 VIRUS COM AR LockBit Green and phishing that targets organizations VIRUS COM AR Dissecting TriangleDB, a Triangulation spyware implant VIRUS COM AR A bowl full of security problems: Examining the vulnerabilities of smart pet feeders LEAVE A REPLY Cancel reply Log in to leave a comment - Advertisement -APLICATIONS VIRUS COM AR Attackers Steal E-Mails, Info from OpenWrt Forum Admin - January 19, 2021 0 Users of the Linux-based open-source firmware—which include developers from commercial router companies--may be targeted by phishing campaigns, administrators warn. Source: Threadpost Adobe Critical Code-Execution Flaws Plague Windows Users March 9, 2021 Secret Service Creates Cyber Fraud Task Forces July 13, 2020 Zoom Screen-Sharing Glitch ‘Briefly’ Leaks Sensitive Data March 18, 2021 HOT NEWS VIRUS COM AR Vobfus.gen VIRUS COM AR Pioneer Kitten APT Sells Corporate Network Access VIRUS COM AR Security Analyst Summit 2017 Day One Recap VIRUS COM AR New zero-day vulnerability CVE-2019-0859 in win32k.sys