Security Affairs

OilRig APT group: the evolution of attack techniques over time

Security researcher Marco Ramilli presents a comparative analysis of attacks techniques adopted by the Iran-Linked OilRig APT group. Today I’d like…

6 years ago

The number of exploits in the Echobot botnet reached 59

The operators behind the recently discovered Echobot botnet added tens of new exploits to infect a broad range of systems…

6 years ago

SWAPGS Attack – A new Spectre-V1 attack affects modern chips

Experts discovered a new variant of the Spectre vulnerability (SWAPGS Attack) that affects modern Intel CPUs which leverage speculative-execution, and also some AMD…

6 years ago

New Lord Exploit Kit appears in the threat landscape

Security experts discovered a new exploit kit, dubbed Lord Exploit Kit, that is currently targeting vulnerable versions of Adobe Flash…

6 years ago

Expert publicly disclosed a zero-day vulnerability in KDE

A security expert has published PoC code exploit for a vulnerability in the KDE software framework that is yet to…

6 years ago

Crooks turn victims into money mules via confidence/romance scams

The FBI published a security advisory to warn of cyber actors using online dating sites to conduct confidence/romance scam and…

6 years ago

CafePress Data Breach exposes technical details of 23 Million users

CafePress, the popular T-Shirt and merchandise website, suffered a data breach that exposed the personal details of 23 million of…

6 years ago

The Evolution of Aggah: From Roma225 to the RG Campaign

The experts at Yoroi-Cybaze ZLab discovered a new wave of attacks linked to the cyber espionage campaign tracked as Roma225.…

6 years ago

QualPwn Bugs in Qualcomm chips could allow hacking Android Over the Air

Researchers discovered two serious flaws, QualPwn bugs, in Qualcomm's Snapdragon SoC WLAN firmware that could be exploited to hack Android…

6 years ago

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

The STRONTIUM Russia-linked APT group is compromising common IoT devices to gain access to several corporate networks. Researchers at Microsoft…

6 years ago

This website uses cookies.