Hackers looking for a quick buck will go for the low-hanging fruit – and if that can be achieved by locking down a small business with ransomware, or breaching their network to steal credit card information and other personal data, that’s what they’ll do.
The TrickBot authors continue to target various financial institutions across the world, using MS17-010 exploits in an attempt to successfully laterally move throughout a victim’s network…
Phorpiex as a malware family has been around for several years and hasn’t changed much in purpose, functionality, or code…
Cyber criminals are targeting victims with a two-pronged attack that secretly infiltrates systems with data-stealing malware, before dropping ransomware onto the infected system.
It might seem like a concept born from Altered Carbon’s stack technologies, but according to cyber-security firm Kaspersky Lab and the University of Oxford Functional Neurosurgery Group, cyber-attacks might not always be limited to the physical when it comes to our health.
Triton targets the industrial control systems made by Schneider Electric which are used in 18,000 different plants around the world.
The unknown hackers exploited three software vulnerabilities in Facebook’s code impacting the “View As” feature, which lets you see what your profile looks like to the public or a specific individual. By exploiting the bugs, the attackers stole Facebook access tokens for user accounts…
Whereas all BIOS routines are stored in firmware, UEFI resides in a folder in flash memory on the motherboard or on the hard drive or network drive.
The attack targeted the computer’s UEFI, which stands for Unified Extensible Firmware Interface, and is used to boot up the system. By re-writing the UEFI, the malware can persist inside the computer’s flash memory, allowing it to survive operating system re-installs and hard disk replacements.
Park worked under titles of “developer” and “online game developer,” listing the ability to code in Java, JSP, PHP, Flash, but also Visual C++, the language in which most Lazarus Group malware was written in.