Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader issue, dubbed BootHole, that can be exploited to install a stealthy malware. Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader vulnerability, tracked as CVE-2020-10713 and dubbed BootHole, which can be exploited by attackers to install persistent and stealthy […]
Experts spotted an undetectable Linux malware that exploits undocumented techniques to evade detection and targets publicly accessible Docker servers Cybersecurity researchers at Intezer spotted a new completely undetectable Linux malware, dubbed Doki, that exploits undocumented evasion techniques while targeting publicly accessible Docker servers. The ongoing Ngrok mining botnet campaign is targeting servers are hosted on popular cloud platforms, including Alibaba […]
ShinyHunters, a trusted threat actor, is offering on a hacker forum the databases stolen from eighteen companies, over 386 million user records available online. The known threat actor ShinyHunters has begun leaking for free the databases of multiple companies on a hacker forum. A couple of days ago, the popular digital banking app Dave.com disclosed a security […]
Group-IB’s report uncovers major players and driving forces of a criminal digital piracy syndicate which has been flourishing in the post-Soviet space Group-IB, a global threat hunting and intelligence company headquartered in Singapore, today presented its report âJolly Rogerâs patrons. Group-IB exposes financial crime network of online pirates in developing countries.â The document uncovers major players […]
Cyble researchers reported that Nefilim ransomware operators allegedly targeted the Dussmann group, the German largest private multi-service provider Researchers from threat intelligence firm Cyble reported that Nefilim ransomware operators allegedly targeted the Dussmann group, the German largest private multi-service provider. The Dussmann Group has over 64,500 employees in 22 countries, it is one of the […]
Yet another Multipurpose Breakout Board to hack hardware in a clean and easy way! How to hack IoT & RF Devices with BĂŒrtleinaBoard. Disclaimer: due to a complaint from the citizens of my native city in Italy⊠I had to rename #PiadinaBoard into #BurtleinaBoard đ Few months ago I have presented #FocacciaBoard: a similar multipurpose breakout board […]
US and UK cybersecurity agencies issued a joint advisory about the spread of QSnatch Data-Stealing Malware that already infected over 62,000 QNAP NAS devices. The United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdomâs National Cyber Security Centre (NCSC) issued a joint advisory about a massive ongoing campaign spreading the QSnatch data-stealing malware. The malicious code […]
Smartwatch and wearable device maker Garmin announced that its computer networks were coming back after the ransomware attack that took place last week. Last week, on July 23, smartwatch and wearable device maker Garmin had to shut down some of its connected services and call centers following a ransomware attack. A few days after the […]
NSA is warning of cyber attacks launched by foreign threat actors against organizations in the critical infrastructure sector across the U.S. The U.S. National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an alert warning of cyber attacks targeting critical infrastructure across the U.S. âOver recent months, cyber-actors have demonstrated their […]
A new version of the REMnux Linux toolkit for malware analysts is available for download, it includes a huge set of tools for professionals. REMnux is a Linux toolkit for reverse-engineering and dissecting software, it includes a collection of free tools created by the community that allows researchers to investigate malware. The toolkit was first […]