Security Alert: FIN8 is Back in Business, Targeting the Hospitality Industry

Security Alert: FIN8 is Back in Business, Targeting the Hospitality Industry

During the period of March to May 2019, Morphisec Labs observed a new, highly sophisticated variant of the ShellTea / PunchBuggy backdoor malware that attempted to infiltrate a number of machines within ...
A look at Hworm / Houdini AKA njRAT

A look at Hworm / Houdini AKA njRAT

Hworm/njRAT is a Remote Access Tool (RAT) that first appeared in 2013 in targeted attacks against the international energy industry, primarily in the Middle East. It was soon commoditized and is now ...
Inside the ASUS Supply chain attack

Inside the ASUS Supply chain attack

Introduction This week, Kaspersky Lab reported initial details of a new supply chain attack on systems by computer giant ASUS. Dubbed ShadowHammer by Kaspersky, the attack leveraged a malicious version of ASUS ...
New Global Attack on Point of Sale Systems

New Global Attack on Point of Sale Systems

This post was authored by Michael Gorelik and Alon Groisman. Over the past 8-10 weeks, Morphisec has been tracking multiple sophisticated attacks targeting Point of Sale thin clients globally ...
Phone Motion Sensors: The New Attack Vector

Phone Motion Sensors: The New Attack Vector

Quite likely, this subterfuge attack, utilizing one of the more clever methods to evade detection to date, is the new attaque-du-jour ...
Proof(s)

Proof(s)

Kevin Hartnett, Senior Writer at Quanta Magazine, expounds on the notion of formal code verification when utilzied to provide assurance of attack-proof code... Similar to unsinkable ocean liners, or truly attack-proof? Or, ...
 Illustration from the Kaspersky Labs  Document .

Six Years The Lurker

Illustration from the Kaspersky Labs Document. Dan Goodin, writing at ArsTechnica, provides us with the surreptitious history of the malice-filled code-miscreant APT monikered Slingshot; of which, is apparently an alternatative mwthod of ...
Apple, Heal Thyself

Apple, Heal Thyself

Felix Krause, well-known founder of fastlane, has discovered a procedural + programmatic heretofore undiscussed attack vector of rather gaping proportions... Namely, the capability of any Mac application to leverage connectivity to the ...