Researchers from Arbor Networks’ Security Engineering and Response Team (ASERT) say they have unearthed fresh leads on the tools and techniques used in the most recent wave of Shamoon attacks.
Browsing Category: Hacks
By making the Vulnerability Equities Process law, advocates of the idea argue there would be more reliability, transparency and accountability in the process of government vulnerability disclosure.
Newly disclosed FTP injection vulnerabilities in Java and Python that are fueled by rather common XML External Entity (XXE) flaws allow for firewall bypasses.
Google Project Zero researchers are warning of an unpatched Microsoft vulnerability in the Windows’ GDI library that allows attackers to steal sensitive data from program memory.
Researchers demonstrate how malicious apps can break into secure Android work containers on EMM managed phones.
Cris Thomas of Tenable Networks, aka Space Rogue of the L0pht, talks to Mike Mimoso during RSA Conference about the rhetoric and hype surrounding cyberwar, as well as a quick trip down memory lane with the L0pht and its famous 1998 testimony before Congress.
A RSA Conference panel tackles the difficulty in defining cyberwar.
Increasingly, governments are outsourcing state-sponsored attacks to mitigate risk and maximize intelligence.
A new industry consortium publishes a manifesto it hopes will foster cooperation on the security of autonomous vehicles.
St. Jude Medical added another Merlin@home Transmitter medical device to its list of equipment vulnerable to a man-in-the-middle attack.