Please turn on your JavaScript for this page to function normally.
magnify
Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits

Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible …

door
Old and new OpenSSH backdoors threaten Linux servers

OpenSSH, a suite of networking software that allows secure communications over an unsecured network, is the most common tool for system administrators to manage rented Linux …

biohazard
Conficker: A 10-year retrospective on a legendary worm

This November marked the 10-year anniversary of Conficker, a fast-spreading worm targeting Microsoft systems that went on to claim one of the highest levels of infection in …

malware
Vaporworms: New breed of self-propagating fileless malware to emerge in 2019

WatchGuard Technologies’ information security predictions for 2019 include the emergence of vaporworms, a new breed of fileless malware with wormlike properties to …

danger
Ransomware is the leading cyber threat experienced by SMBs

Ransomware continues to be the leading cyber attack experienced by SMBs over viruses and spyware, according to Datto. Their report surveyed 2,400 MSPs that support the IT …

biohazard
FlawedAmmy: Dangerous RAT enteres most wanted malware list

The latest Check Point Global Threat Index reveals that while cryptomining malware continues to dominate the rankings, a remote access Trojan has reached the top ten’s list …

industrial
USB threat vector trends and implications for industrial operators

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

biohazard
Nastiest malware of 2018: Top attack payloads wreaking havoc

Webroot highlights the top cyberattacks of 2018 in its latest nastiest malware list, which showcases the malware and attack payloads that have been most detrimental to …

Microsoft Word
Word documents seemingly carrying videos can deliver malicious code instead

A feature that allows anyone to embed a video directly in a Word document can be easily misused to trick target users into downloading and running malware, Cymulate …

ransomware
Bitdefender releases GandCrab ransomware decryption tool

Bitdefender released a decryption tool for recent versions of GandCrab, the world’s most prolific ransomware. Developed in close partnership with Europol and the …

danger
USA and China identified as top cyber attack sources

NSFOCUS released its H1 Cybersecurity Insights report, which analyzed traffic from January 1, 2018 to June 30, 2018. Crypto miners Since the end of March, the number of crypto …

ship
Vulnerable controllers could allow attackers to manipulate marine diesel engines

Researchers have found several authentication and encryption vulnerabilities in the firmware of marine diesel engine controllers by Norwegian company Auto-Maskin, as well as …

Don't miss

Cybersecurity news