article thumbnail

Answering Log4Shell-related questions

SecureList

The questions were asked during our “ The Log4Shell Vulnerability – explained: how to stay secure ” webinar. The Log4Shell vulnerability webinar FAQ. The exploitation attempt will use different types of services like LDAP, RMI, DNS etc. Is it safe to use version 1.x? x is an outdated version no longer supported.

IoT 86
article thumbnail

IT threat evolution Q1 2022

SecureList

The group uses various malware families, including Wroba, and attack methods that include phishing, mining, smishing and DNS poisoning. Subsequently, DDoS attacks hit some government websites. You can find the recording of the webinar here and a summary/Q&A here. zip”).

Phishing 117
article thumbnail

APT trends report Q1 2022

SecureList

Subsequently, DDoS attacks hit several government websites. You can find the recording of the webinar here and a summary/Q&A here. In July 2021, we reported the previously unknown Tomiris Golang backdoor , deployed against government organizations within a CIS country through DNS hijacking.

Malware 137