Category: News
You are here: Home \ News \ Page 36
Threatpost talked to several security researchers about what’s changed in the past year.
Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices.
The vulnerability allows an attacker to execute a malware or other payloads on a client machine by sending malicious messages from the DHCP server.
Cryptominer WinstarNssmMiner is an aggressive malware strain that has launched 500,000 attacks in the past three days earning criminals $28,000.
The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim’s system, in order to drop additional payloads later.
Researchers have discovered a set of custom surveillanceware tools being deployed against Android and iOS devices primarily in the Middle East.
Sources said the funds were diverted to fraudulent accounts in a coordinated heist that involved hundreds of wire transfers and on-the-ground accomplices.
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.
Adobe has issued a round of higher priority patches less than a week after its Patch Tuesday updates last week.
The flaws threaten to expose corporate communications in Outlook as well as the messages of at-risk users like political dissidents.
... 323334353637383940 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ...