Researchers Blame ‘Monolithic’ Linux Code Base for Critical Vulnerabilities
With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity. Go to Source
With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity. Go to Source
The spyware’s surveillance capabilities are extensive, logging every call, text, photo, video and more, and sending the data to the attackers. Go to Source
Cryptojacking attacks are on the rise. We talk to security researcher Troy Mursch about why bad actors are drawn to this attack technique. Go to Source
The highly sophisticated operation shares code with the Hermes malware, and may be linked to the Lazarus Group APT actor. Go to Source
Dark Tequila, which has been active since 2013, is highly modular and targets victims in Mexico. Go to Source
Attackers can abuse URL requests processed by an email program for Mac to steal files from the victim — sometimes without user interaction. Go to Source
An unpatched buffer overflow flaw allows remote attackers to completely take over the device and enter the home network. Go to Source
Bishop Fox’s Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month. Go to Source
An attacker could escalate privileges on the server, further penetrating the network, harvesting customer information or mounting credible social-engineering campaigns. Go to Source
Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board. Go to Source