Remove tag internet-explorer
article thumbnail

North Korean Hackers Look to Internet Explorer Zero Days

Data Breach Today

Google TAG Attributes Expoloits to State-Sponsored APT37, aka Reaper Microsoft Office's use of Internet Explorer to render HTML is the gift that keeps giving for North Korean hackers.

Security 130
article thumbnail

APT37 used Internet Explorer Zero-Day in a recent campaign

Security Affairs

Google warns that the North Korea-linked APT37 group is exploiting Internet Explorer zero-day flaw to spread malware. North Korea-linked APT37 group (aka ScarCruft , Reaper, and Group123) actively exploited an Internet Explorer zero-day vulnerability, tracked as CVE-2022-41128 , in attacks aimed at South Korean users.

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google: four zero-day flaws have been exploited in the wild

Security Affairs

Security researchers from Google Threat Analysis Group (TAG) and Google Project Zero revealed that four zero-day vulnerabilities have been exploited in the wild earlier this year. The four security flaws were discovered earlier this year and affect Google Chrome, Internet Explorer, and WebKit browser engine.

article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

Google TAG shared indicators of compromise (IoCs) for both campaigns. The experts pointed out that both campaigns were limited and highly targeted. The exploits were used to install commercial spyware and malicious apps on targets’ devices.

article thumbnail

Microsoft released an out-of-band patch to fix Zero-day flaw exploited in the wild

Security Affairs

Microsoft released an out-of-band patch to address a Zero-day memory corruption vulnerability in Internet Explorer that has been exploited in attacks in the wild. Microsoft has released an out-of-band patch for an Internet Explorer zero-day vulnerability that was exploited in attacks in the wild.

Access 79
article thumbnail

What Is Rum data and why does it matter?

IBM Big Data Hub

NS1 Connect adds JavaScript tags to that web property which collect information about inbound user traffic. When an end user visits the web property, that JavaScript tag performs a series of tests which collect data on performance and availability. Those test results are then sent to NS1 Connect for analysis.

IT 71
article thumbnail

North Korea-linked hackers target security experts again

Security Affairs

Researchers from Google’s Threat Analysis Group (TAG) reported that North Korea-linked hackers are targeting security researchers via social media. ” reads the post published by Google TAG. The cyberspies used fake Twitter and LinkedIn social media accounts to get in contact with the victims.