backdoor

Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

10 years ago

Undetectable Adwind RAT used in targeted attacks

Experts from security firm Heimdal Security have detected a malicious spam campaign delivering attachments laced with the Adwind RAT. Experts…

10 years ago

Godless, the Android Malware that employs multiple rooting exploits

Godless is a new strain of Android Malware recently spotted by experts from Trend Micro that leverages multiple rooting exploits.…

10 years ago

Fabrication-time Attacks and the Manchurian Chip

Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time…

10 years ago

A Kernel backdoor affects gadgets shipped by a popular Chinese ARM maker

Processors manufactured by the  Chinese ARM maker Allwinner are affected by a kernel backdoor and are present is several models…

10 years ago

Cisco Talos warns that Tuto4PC installed a Backdoor on 12 Million PCs

Security experts from Cisco Talos classified as a backdoor the popular Tuto4PC advertising software installed on a network of 12…

10 years ago

IBM warns a spike in the number of PHP C99 Webshell Attacks

IBM Security has warned the WordPress community about a spike in the number of attacks leveraging a specific variant of…

10 years ago

Potentially backdoored AMX equipment being used by US President Obama and US Military

Experts from the security firm SEC Consult discovered a backdoor in the AMX equipment being used by US President Obama…

10 years ago

How to convert 30$ D-Link DCS web cameras into a backdoor

A group of researchers from Vectra Threat Labs explained how to exploit IoT devices like 30$ D-Link DCS web cameras…

10 years ago

Hackers in the wild attempt to exploit the Juniper Backdoor

A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the…

10 years ago

This website uses cookies.