New Botnet Targets Unpatched Router Vulnerability, Because Of Course

New Botnet Targets Unpatched Router Vulnerability, Because Of Course

Attackers thrive on old, unpatched vulnerabilities. They are not going to burn a zero-day exploit unless they absolutely have to and will look for known holes in devices and network configurations to find their way inside ... Read More
Hey Criminals! Don't Trust Your Shady Encryption Providers

Hey Criminals! Don’t Trust Your Shady Encryption Providers

| | hacks, news reaction
Given the technical bugs in IronChat's application, it already throws red flags as an insecure tool for use by a clandestine organization ... Read More
It's Hard to Find Android Malware in the Google Play Store

It’s Hard to Find Android Malware in the Google Play Store

The rate of malware actually on people’s devices does not match Android’s reputation for being a hellpit of malicious apps and activity ... Read More
Bluetooth Nightmares: Bleedingbit Bugs in Texas Instrument Chips

Bluetooth Nightmares: Bleedingbit Bugs in Texas Instrument Chips

| | Vulnerabilities
Bugs in the bluetooth make access points a sad boy.Source: ZDNetThe details: Two new zero-day vulnerabilities were discovered this year in Bluetooth Low Energy (aka Bluetooth Smart) chips produced by manufacturer Texas Instruments used by billions of devices across the globe.The primary threat is the fact that ... Read More
Ecommerce "Formjacking" is Attackers New Kind of Card Skimming

Ecommerce “Formjacking” is Attackers New Kind of Card Skimming

"Every additional domain reference or third-party package is a risk multiplier. These days there isn’t a good way for most people to quantify the risk posed by any particular page." ... Read More
Older MacOS and iOS Versions Vulnerable to Remote Code Execution Attacks

Older MacOS and iOS Versions Vulnerable to Remote Code Execution Attacks

| | hacks
"This is not the first time a buffer overflow has been found in a kernel and frankly will not be the last." ... Read More
Triton Framework Exposes Russia's Craft in SCADA Attacks

Triton Framework Exposes Russia’s Craft in SCADA Attacks

| | hacks
The Triton malware appears to have been written to enable the attackers to quickly and effectively adjust their attack strategy based on the software and hardware deployed within the environment ... Read More
Persistence of SamSam Ransomeware Attacks Highlight Basic Security Flaws

Persistence of SamSam Ransomeware Attacks Highlight Basic Security Flaws

SamSam attackers know what they are doing. This is not some fly-by-night operation of opportunity. SamSam and other ransomware attacks expose basic failings in security ... Read More
China Turns to Insiders in Latest Move to Win Economic Cyber War

China Turns to Insiders in Latest Move to Win Economic Cyber War

| | hacks, news reaction
The hackers used a range of techniques, including spear phishing, sowing multiple different strains of malware into company computer systems ... Read More
Malicious Python Packages Provide a Backdoor to the Careless Coder

Malicious Python Packages Provide a Backdoor to the Careless Coder

The code was designed to collect data from the infected system, obtain boot persistence or, “even open a reverse shell on remote workstations ... Read More