Home Tags Malicious Code

Tag: Malicious Code

At last yearrsquo;s Security Analyst Summit 2017 we predicted that medical networks would be a titbit for cybercriminals. Unfortunately, we were right.

The numbers of medical data breaches and leaks are increasing.

According to public data, this year is no exception.

The Slingshot APT FAQ

While analyzing some memory dumps suspicious of being infected with a keylogger, we identified a library containing strings to interact with a virtual file system.

This turned out to be a malicious loader internally named “Slingshotrdquo;.
For the last few years, rooting malware has been the biggest threat to Android users.

These Trojans are difficult to detect, boast an array of capabilities, and have been very popular among cybercriminals.
Widely used message transfer agent patched buffer overflow last month.

Mining is the new black

Last year we published a story revealing the rise of miners across the globe.

At the time we had discovered botnets earning millions of USD. We knew this was just the beginning of the story, which turned out to develop rapidly.
Ongoing attacks give complete control and require no user interaction.
Outage comes a day after CEO admitted emailing private keys for 23k HTTPS certs.
Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud Services Routers (CSR) 1000v Series contains the following vulnerabilities: Cisco IOS XE S...
Developers are in the process of releasing updates the fix the critical flaws.
Of all the forms of attack against financial institutions around the world, the one that brings traditional crime and cybercrime together the most is the malicious ecosystem that exists around ATM malware.

Criminals from different backgrounds work together with a single goal in mind: jackpotting.
Also: Big Blue's Meltdown, Spectre status updated, and a mystery bug in AIX IBM has warned that bugs in its Notes auto-updater mean the service can be tricked into running malicious code.…
A search online lead me to a discovery I didnrsquo;t think was possible nowadays.
I realized almost immediately that critical security issues were probably involved.
I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable.