Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded devices intended for use within business environments in an attempt to gain control over larger bandwidth to carry out devastating DDoS attacks.
Although the original creators of Mirai botnet have already been arrested and jailed, variants of the infamous IoT malware
Posted in Cyber Attack, ddos attack, ddos tool, IoT Malware, malware, mirai, mirai botnet, mirai malware, networking, Router hacking | Comments (0)
Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide.
Why? Because the WinRAR software doesn't have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks.
Posted in Download Windows Update, hacking news, malware, Vulnerability, WinRar, winrar exploit | Comments (0)
Security researchers have finally, with "high confidence," linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT hacking group.
Thanks to the new evidence collected by researchers after analyzing a command-and-control (C2) server involved in the espionage campaign and seized by law enforcement.
Posted in Cyber Attack, cyber espionage, Lazarus Group, malware, North Korea, North Korean hackers, South Korea | Comments (0)
Cybersecurity researcher at Google's Project Zero division has publicly disclosed details and proof-of-concept exploit of a high-severity security vulnerability in macOS operating system after Apple failed to release a patch within 90 days of being notified.
Discovered by Project Zero researcher Jann Horn and demonstrated by Ian Beer, the vulnerability resides in the way macOS XNU kernel
Posted in Apple Mac OS X, Apple macOS Mojave, hacking macos, hacking news, MacOS, macos exploit, macos hacking, malware | Comments (0)
Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors that isolates sensitive code and data to protect it from disclosure or modification.
In other words, the technique allows attackers to implant malware code in a secure memory that uses protection features of SGX which are otherwise
Posted in hardware hacking, intel chipset, intel processor, Intel SGX, Intel SGX Enclaves, malware | Comments (0)