FreeRTOS Flaws Puts Many IoT, ICS Devices at Risk

FreeRTOS Flaws Puts Many IoT, ICS Devices at Risk

Security researchers have found serious vulnerabilities in FreeRTOS, an open source operating system that’s commonly used in embedded devices including those in smart homes and critical infrastructure. FreeRTOS is a lightweight real-time ...
Security Boulevard
FireEye Focuses on Email Security Analysis with Free Offering

FireEye Focuses on Email Security Analysis with Free Offering

FireEye has begun offering a free service through which IT organizations can evaluate their email security, as those systems have become the primary mechanism through which malware gets introduced into the enterprise ...
Security Boulevard
Know Your Firewall: Layer 3 vs. Layer 7

New Attacks Reuse Malware Code from Dormant APT1

New attacks against organizations from South Korea, Canada and the United States use a malicious implant that’s based on an old malware program associated with a dormant Chinese APT group known as ...
Security Boulevard
BlackEnergy Successor Hits Energy Companies Since 2015

BlackEnergy Successor Hits Energy Companies Since 2015

For the past three years, a stealthy cyberespionage group has been targeting energy companies, primarily from Poland and Ukraine, using a new malware framework dubbed GreyEnergy. GreyEnergy is a modular malware platform ...
Security Boulevard
Best Practices for Data Security

Spyware Pushers Modify Equation Editor Exploit to Bypass AV Detection

In a case that shows you can teach an old exploit new tricks, a group of attackers who push information-stealing malware modified a well-known exploit in a way that it bypasses detection ...
Security Boulevard
Microsoft's JET Vulnerability Patch Incomplete, Researchers Say

Microsoft’s JET Vulnerability Patch Incomplete, Researchers Say

The patch released by Microsoft last week for a zero-day flaw in the JET database engine is incomplete and does not fully address the issue, according to a vulnerability research firm. The ...
Security Boulevard
Language Matters Data Breach

Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as the Five Eyes, have released a joint report on five publicly available ...
Security Boulevard
Backdoor Links 2016 Ukrainian Blackout to Sandworm APT and NotPetya

Backdoor Links 2016 Ukrainian Blackout to Sandworm APT and NotPetya

Analysis of a new backdoor program allowed malware researchers to establish clear links between the cyberattacks that led to power outages in Ukraine in 2015 and 2016 and the NotPetya ransomware outbreak ...
Security Boulevard
Rethinking Cybersecurity About Data

Magecart Injects Skimmer Code in Customer Rating Widget

The groups of attackers who specialize in injecting payment card skimmer code called Magecart into online shops managed to compromise a third-party customer rating plugin called Shopper Approved that’s used by thousands ...
Security Boulevard
Cybersecurity Automation Ambitions

Red Hat Extends Cybersecurity Automation Ambitions

Red Hat has announced it plans to extend the open source Ansible framework for automating IT operations into the realm of cybersecurity. Announced this month at the AnsibleFest 2018 conference, Red Hat ...
Security Boulevard
Loading...