Sednit update: How Fancy Bear Spent the Year
The Sednit group — also known as Strontium, APT28, Fancy Bear or Sofacy — is a group of attackers operating since 2004, if not earlier, and whose main objective is to stealRead More →
The Sednit group — also known as Strontium, APT28, Fancy Bear or Sofacy — is a group of attackers operating since 2004, if not earlier, and whose main objective is to stealRead More →
A setting, disabled by default, enables FortiClient on the logon screen to allow users to connect to a VPN profile before logon. An attacker, with physical, or remote (e.g. throughRead More →
Researchers have identified a vulnerability in a Huawei home router model that is being exploited by an adversary to spread a variant of the Mirai malware called Okiku, also knownRead More →
As we edge toward Christmas, scammers are throwing their own party—in the form of Facebook phishing pages linked to and from bogus landing pages hosted on sites(dot)google(dot)com URLs. These landingRead More →
Charges filed against pair coincide with arrests abroad. Two of the five unnamed individuals cuffed this month in Romania on suspicion of spreading ransomware face US computer crime charges – for theirRead More →
Security analysis and penetration testing is an integral part of creating any kind of secure network. This brings us to the WiFi hacking software that could be used for ethicallyRead More →
A few days ago, an iPhone user discovered that his old iPhone felt slower because the battery was getting old. His empirical findings were later confirmed by a benchmark thatRead More →
Bad configuration leaves ATM exposed to further hacks. We’ve known for a while that ATM machines running Windows XP (Embedded version or not) are exposed to attacks, but when weRead More →
Like good old Microsoft Office Macros, Compiled HTML (CHM) Help files have been utilized by malware authors for more than a decade to sneak malicious downloader code into files makingRead More →
Google’s Project Zero released details of a local proof-of-concept attack against a fully patched Windows 10 PC that allows an adversary to execute untrusted JavaScript outside a sandboxed environment onRead More →