Raging Sysadmin Shuts Down Company Servers, Deletes System Files
A former sysadmin is facing up to ten years in prison and a fine of up to $250,000 after he used a backdoor account and sabotaged his former employer onRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
A former sysadmin is facing up to ten years in prison and a fine of up to $250,000 after he used a backdoor account and sabotaged his former employer onRead More →
Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to malware installed on an air-gapped computer. Further researchRead More →
Supo: Espionage rising, attacks on infrastructure falling. The Finnish Security Intelligence Service Supo is complaining that nation-state-level attackers aren’t even bothering to hide themselves from prying eyes. That news comesRead More →
Chromium engineers are discussing plans to change how JavaScript popups work inside Chrome and other similar browsers. In a proposal published on the Google Developers portal, the Chromium team acknowledgedRead More →
A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV,Read More →
The man is suspected of blackmail and hacking offenses. On Tuesday, the UK’s National Crime Agency (NCA) arrested a young man on suspicion of hacking and extortion offenses, Motherboard hasRead More →
The US Department of Justice announced yesterday that Maxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty for his role in the creation of the Ebury malware and for maintainingRead More →
Developers sharing code on GitHub are being targeted in a malicious email campaign that’s infecting their computers with a modular trojan known as Dimnie. GitHub users first started noticing andRead More →
A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumerRead More →
The author of the Nuclear Bot banking trojan has leaked the source code of his own malware in a desperate attempt to regain trust and credibility in underground cybercrime forums.Read More →
Redmond pledges to defend users against government hacks. Microsoft is one of the companies that brought the US government to court for data request orders which it claimed violated theRead More →
APT29, a/k/a Cozy Bear, has been utilizing a technique called domain fronting in order to secure backdoor access to targets for nearly two years running, experts said Monday. The nation stateRead More →
This past Saturday security researchers Kafeine, MalwareHunterteam, BroadAnalysis, and David Martínez discovered a new ransomware being distributed through EITest into the RIG exploit kit. As this ransomware was only distributed for one day and does notRead More →
A new adware family named Crusader will rewrite tech support phone numbers returned in Google search results, display ads, and show popups pushing tech support scams. Current versions of CrusadersRead More →
Apple fixes flaw attackers used to trick uninformed users into paying a fine. Ransomware scammers have been exploiting a flaw in Apple’s Mobile Safari browser in a campaign to extortRead More →
The Brits join US intelligence agencies who’d want a backdoor into the encryption feature on all services. End-to-end encryption services like WhatsApp are once more being slammed for offering protectionRead More →
Hackers have breached America’s Job Link Alliance (AJLA), a job portal offered by the Department of Labor (DOL), and stolen personal details from an undisclosed number of job seekers. AJLA,Read More →
Short Bytes: The DIY tech inventor NODE has created a handheld all-in-one computer that runs Linux. It’s made using the new Raspberry Pi Zero W, some 3D printed parts, and anRead More →
Thanks a Miele-on for making everything dangerous, Internet of things security slackers. Don’t say you weren’t warned: Miele went full Internet-of-Things with a dishwasher, gave it a web server andRead More →
Security experts say they are skeptical that a group of hackers called Turkish Crime Family actually possess a cache of hundreds of millions of Apple iCloud account credentials. A moreRead More →