ESET cyber security experts: It’s GSM plugin uses AT command protocol and has Tor for network communications. It targets Russia and diplomatic missions-governments in Eastern Europe.
Cyber security experts tracked the bitcoin payments made by the ransomware’s victims and concluded that some of the distributors of the malware earned millions from the scheme.
The cyber security expert Marco Ramilli, founder of Yoroi-Cybaze analyzed a mail on a “weekly report”. It hides a Word document within obfuscated Macros who drops-executes the malware.
Researcher at MIT and University of California at San Diego (UCSD) developed a new machine-learning system. It illuminates some of the common qualities of the “serial hijackers.
The cyber security experts: There are two vulnerabilities linked to insufficient sanitization of user-supplied data, that pose risks of XSS scripting and SQL Injection. Update it!
Threats to networks availability-integrity will become major security concern. The new technology will increase exposure to attacks and give more potential entry points for malicious hackers.
Nine of them were “Critical”, the others “Important” or “Moderate”. The first could allow an attacker to take control of an affected system, thanks to RCS. UPDATE the systems now!
Cyber security expert Joakim Kennedy found a new malware variant with a boastful note, with references to Baltimora and Greenville cyber attacks to increase pressure on victims.
Joint analysis by Malwarebytes and HYAS cyber security experts: Significant similarities between the registration information for domain names used in their infrastructure by both groups.
Google’s Project Zero expert Maddie Stone: The flaw is related to at least 18 phones models. It can give attackers full control of the phone and it’s being exploiting in the wild.