MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers

8 years ago

MOSQUITO is new technique devised by a team of researchers at Israel's Ben Gurion University, led by the expert Mordechai Guri,…

Study confirms the trade of code-signing certificates is a flourishing business

8 years ago

According to a new study conducted by American and Czech researchers, the trade of code-signing certificates is a flourishing business.…

13 Vulnerabilities in Hanwha SmartCams Demonstrate Risks of Feature Complexity

8 years ago

The researchers at Kaspersky Lab ICS CERT decided to check the popular Hanwha SmartCams and discovered 13 vulnerabilities. Wikipedia describes Attack…

China-Linked APT15 used new backdoors in attack against UK Government’s service provider

8 years ago

China-Linked APT15 used new backdoors is an attack that is likely part of a wider operation aimed at contractors at…

The South America connection and the leadership on ATM Malware development

8 years ago

Besides being known about corruption scandals, South America is a reference to the development of ATM malware spreading globally with…

Kaspersky – Sofacy ‘s campaigns overlap with other APT groups’ operations

8 years ago

According to Kaspersky, the Sofacy APT is particularly interested in military, defense and diplomatic entities in the far east, but…

Cryptocurrency mining operations target Windows Server, Redis and Apache Solr servers online

8 years ago

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache…

Security Affairs newsletter Round 153 – News of the week

8 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…

Hacking Team is back … probably it never stopped its activity. Watch Out!

8 years ago

ESET collected evidence of Hacking Team 'activity post-hack, the company published an interesting analysis based on post hack samples found…

Governments rely on Sandvine network gear to deliver spyware and miners

8 years ago

According to Citizen Lab, some governments are using Sandvine network gear installed at internet service providers to deliver spyware and…

This website uses cookies.