Get a Pentest and security assessment of your IT network.

Cyber Security

Reproducing the Aurora IE Exploit With Metasploit

Researchers have spotted notable code overlap between Sunburst backdoor and a known Turla weapon. Researchers at Recorded Future report a rise in cracked Cobalt Strike and other open-source adversarial tools with easy-to-use interfaces. This video features a detailed demonstration of a technique for reproducing the Aurora Internet Explorer exploit using the Metasploit Framework. Researchers lack confidence in organizations’ defenses against looming Russian #cyberattacks, @wirelesswench report https://t.co/Q8lpOqhc1n.

Source: https://threatpost.com/reproducing-aurora-ie-exploit-metasploit-040210/73776/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation