Home Tags IP Address

Tag: IP Address

"Hacktivist" logged into a social media account from an IP address at GRU HQ in Moscow.
At last yearrsquo;s Security Analyst Summit 2017 we predicted that medical networks would be a titbit for cybercriminals. Unfortunately, we were right.

The numbers of medical data breaches and leaks are increasing.

According to public data, this year is no exception.
The researchers at Kaspersky Lab ICS CERT decided to check the popular smart camera to see how well protected it is against cyber abuses.

This model has a rich feature list, compares favorably to regular webcams and can be used as a baby monitor, a component in a home security system or as part of a monitoring system.

The Slingshot APT FAQ

While analyzing some memory dumps suspicious of being infected with a keylogger, we identified a library containing strings to interact with a virtual file system.

This turned out to be a malicious loader internally named “Slingshotrdquo;.
There are three ways of doing things in the malware business: the right way, the wrong way and the way Brazilians do it.

From the early beginnings, using skimmers on ATMs, compromising point of sales systems, or even modifying the hardware of processing devices, Latin America has been a fertile ground for collecting credit and debit cards en masse.
A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password.

The attacker does need to have a valid username. The vu...
This time, wersquo;ve chosen a smart hub designed to control sensors and devices installed at home.
It can be used for different purposes, such as energy and water management, monitoring and even security systems.
Every year, vast numbers of people around the globe relish the delightful prospect of filling out tax returns, applying for tax refunds, etc.

Given that tax authorities and their taxpayers are moving online, it's no surprise to find cybercriminals hard on their heels.
A vulnerability in the TCP throttling process of Cisco Prime Network could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate limiting protect...
A search online lead me to a discovery I didnrsquo;t think was possible nowadays.
I realized almost immediately that critical security issues were probably involved.
I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable.

Denis and Co.

In April 2017, we published a detailed review of a malicious program that used DNS tunneling to communicate to its CC.

That study prompted us to develop a technology to detect similar threats, which allowed us to collect a multitude of malware samples using DNS tunneling.
We confront hundreds of thousands of new threats every day and we can see that threat actors are on a constant lookout for new attack opportunities.

According to our research, connecting a software license management token to a computer may open a hidden remote access channel for an attacker.