Hacking

13 Vulnerabilities in Hanwha SmartCams Demonstrate Risks of Feature Complexity

The researchers at Kaspersky Lab ICS CERT decided to check the popular Hanwha SmartCams and discovered 13 vulnerabilities. Wikipedia describes Attack…

8 years ago

China-Linked APT15 used new backdoors in attack against UK Government’s service provider

China-Linked APT15 used new backdoors is an attack that is likely part of a wider operation aimed at contractors at…

8 years ago

The South America connection and the leadership on ATM Malware development

Besides being known about corruption scandals, South America is a reference to the development of ATM malware spreading globally with…

8 years ago

Cryptocurrency mining operations target Windows Server, Redis and Apache Solr servers online

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache…

8 years ago

Hacking Team is back … probably it never stopped its activity. Watch Out!

ESET collected evidence of Hacking Team 'activity post-hack, the company published an interesting analysis based on post hack samples found…

8 years ago

Governments rely on Sandvine network gear to deliver spyware and miners

According to Citizen Lab, some governments are using Sandvine network gear installed at internet service providers to deliver spyware and…

8 years ago

Sophisticated APT group compromised routers to deliver Slingshot Spyware

Slingshot spyware - Security researchers at Kaspersky have spotted a new sophisticated APT group that has been operating under the…

8 years ago

North Korean Hidden Cobra APT targets Turkish financial industry with new Bankshot malware

McAfee Advanced Threat Research team discovered that the Hidden Cobra APT group is targeting financial organizations in Turkey. North Korea-linked…

8 years ago

CIGslip attack could allow hacker to bypass Microsoft Code Integrity Guard

Security experts devised a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass Microsoft Code Integrity Guard…

8 years ago

Olympic Destroyer, alleged artifacts and false flag make attribution impossible

  According to Kaspersky Lab, threat actors behind the recent Olympic Destroyer attack planted sophisticated false flags inside their malicious…

8 years ago

This website uses cookies.