The Angler Exploit Kit (EK) is throwing a new line in the cybercrime waters with the addition of an exploit for Adobe Flash Player, and the CryptoWall 3.0 ransomware as a payload....
HTTP://WWW.INFOSECURITY-MAGAZINE.COM/NEWS/PAGE-78/
READ MORE
|
Documents published by WikiLeaks on Thursday provide details on a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to hack routers and access points. Dubbed CherryBlossom, the tool is described by its developers as a system designed for monitoring a target’s Internet activity and delivering software exploits via wireless networking devices. WikiLeaks said the tool was developed and implemented by the CIA with the help of a US-based nonprofit research center called SRI Inte...
SECURITY WEEK
READ MORE
|
Tracking the activity of nefarious groups affords defenders a deeper level of understanding that can be useful in not only understanding different types of threats but also in building defenses to withstand a cyber-attack. Today, Dragos released its updated profile on CHRYSENE ICS, one of the seven groups that have come to fruition from long-running cyber-espionage activity. Sergio Caltagirone, director of threat intelligence, Dragos wrote in his blog post, “The current industrial threat l...
INFOSECURITY MAGAZINE
READ MORE
|
Security giant Trend Micro has dodged a potentially costly copyright infringement trial with Intellectual Ventures after a judge invalidated two key patents belonging to the firm....
INFOSECURITY MAGAZINE
READ MORE
|
Cisco and Ericsson on Monday announced a partnership to build out a next-generation network for smart things and the carriers and enterprises that want to support such devices....
TECHNEWSWORLD
READ MORE
|
The Marriott breach announced on November 30, 2018, was initially suspected to have compromised the data of nearly 500 million customers, but on Friday the Starwood company updated its database security incident advisory to reflect what it now believes to be a more realistic and slightly smaller number of guests that were impacted. After weeks of data analysis, the company was able to eliminate duplicate information and formulate a more accurate upper boundary of approximately 383 million record...
INFOSECURITY MAGAZINE
READ MORE
|