FELIXROOT Backdoor Resurfaces in Environmental Spam Campaign
This backdoor can be used for espionage and for dropping additional malware.
This backdoor can be used for espionage and for dropping additional malware.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Following Apple’s lead in banning cryptocurrency mining apps, Google has also updated its Play Store policy this week to ban apps that mine cryptocurrencies on users’ devices in the background. However, there are countless cryptocurrency mining apps, including MinerGate, AA Miner, NeoNeonMiner, and Crypto Miner, still available on the Play Store. Cryptocurrency mining is not…
A team of security researchers has discovered a new Spectre attack that can be launched over the network, unlike all other Spectre variants that require some form of local code execution on the target system. Dubbed “NetSpectre,” the new remote side-channel attack, which is related to Spectre variant 1, abuses speculative execution to perform bounds-check…
This brand-new RAT represents the latest escalation in an ongoing malware arms race that extends even to commodity malware.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Almost three years after the arrest of two young Dutch brothers, who pleaded guilty to their involvement in creating and distributing CoinVault ransomware malware, a district court in Rotterdam today sentenced them to 240 hours of community service. In 2015, the two suspects — Melvin (25-year-old) and Dennis van den B. (21-year-old) — were arrested…
At Google Cloud Next ’18 convention in San Francisco, the company has introduced Titan Security Keys—a tiny USB device, similar to Yubico’s YubiKey, that offers hardware-based two-factor authentication for your online accounts with the highest level of protection against phishing attacks. These hardware-based security keys are thought to be more efficient at preventing phishing, man-in-the-middle…
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source link Jessica VenkatJessica spends 12 hours a day…
A Pinterest browser button leaks malformed code into any browser-based text editor.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Top tier penetration testers are a breed of their own. Here is how to make sure your pentester is topnotch.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
India-linked highly targeted mobile malware campaign, first unveiled two weeks ago, has been found to be part of a broader campaign targeting multiple platforms, including windows devices and possibly Android as well. As reported in our previous article, earlier this month researchers at Talos threat intelligence unit discovered a group of Indian hackers abusing mobile…