Hidden Cobra Strikes Again with Custom RAT, SMB Malware
The North Korean-sponsored actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files. Go to Source
The North Korean-sponsored actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files. Go to Source
Two Canadian banks reported that they may be targets of a hack after fraudsters claimed that they electronically accessed personal and account information. Go to Source
The threat actors behind widespread attacks on banks and ATM jackpotting campaigns in Russia and Europe resurfaced in may, attacking banks. Go to Source
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext. Go to Source
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash. Go to Source
An exploit for the bypass vulnerability required an HTTP parameter pollution in a web application. Go to Source
Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control (C&C) server. Go to Source
Telcom firm leaves port open on customer routers after maintenance update exposing hundreds of customers to possible attack. Go to Source
The threat actors behind widespread attacks on banks and ATM jackpotting campaigns in Russia and Europe resurfaced in may, attacking banks. Go to Source
A full 98 percent of US enterprises have embarked on information governance (IG) projects, dramatically up from just 10 percent last year. Go to Source