WikiLeaks has released information and source code for a framework allegedly used by the U.S. Central Intelligence Agency (CIA) to make analysis of its tools and attribution more difficult.
read more
Modular Felismus RAT Emerges
A newly discovered piece of malware features a modular design and has been used in highly targeted campaigns, Forcepoint security researchers reveal.
read more
Linux Kernel Flaw Disclosed at Pwn2Own Patched
The Linux kernel vulnerability leveraged at the Zero Day Initiative’s Pwn2Own 2017 competition to hack Ubuntu has been patched.
read more
Turla Group Improves Carbon Backdoor
The Russia-linked threat group known as Turla has continued to make improvements to its Carbon second-stage backdoor, with new versions released on a regular basis, ESET reported on Thursday.
read more
FBI Chief’s Secret Twitter Account Outed?
When Federal Bureau of Investigation Director James Comey teased that he had joined the world of social media with secret Facebook and Twitter accounts, tech writer Ashley Feinberg took the dare.
read more
With New iPhone, Trump Still a Target for Hackers
President Donald Trump has a new phone. An iPhone.
That would not ordinarily be news, but given the security concerns about the risk of hack attacks on the prolific White House tweeter, the shift is significant.
read more
How to Improve Your Chances of Staying Out of the Insider Threat Headlines
Insider Threats Are a Fact of Life and Are Not Going Away.
read more
Hackers Can Use Scanners to Control Air-Gapped Malware
Researchers have published a paper describing how a piece of malware planted on an air-gapped network can be controlled remotely using an office scanner and a light source, such as a laser or a smart bulb.
read more
Pro-ISIS Amaq News Site Hacked to Serve Malware
read more
Continue readingGoogle Patches Dangerous Vulnerabilities in Chrome 57
Google on Wednesday released an update for its Chrome web browser to address five vulnerabilities in the application: one rated Critical and four High risk.
read more

