News

Home News
News.

NCR patches ATM vulnerabilities

Source: ComputerWeekly | By Warwick Ashford ATM maker NCR has issued software security updates after researchers reported flaws in encryption of communications between ATM computers...

Hackers could steal passwords by analyzing thermal residue on keyboards

Source: Cyware | By Samantha Black Thermanator: Hackers could steal passwords by analyzing thermal residue on keyboards Researchers have discovered malicious attackers could potentially analyze the...

New version of CEIDPageLock rootkit found distributed via RIG exploit kit

Source: Cyware | By Sophia Brown • The latest version of CEIDPageLock appears to focus on Chinese victims. • Unlike the previous version of the rootkit,...

Critical security flaw found in control systems of several hospitals and...

Source: Cyware | By Ryan Stewart • Research study exposed a security flaw existing in temperature control systems manufactured by Resource Data Management. • Many popular...

Data breach at Nova Entertainment saw hackers compromise over 250,000 users’...

Source: Cyware | By Sophia Brown • The breach occurred between 2009 and 2011 and is believed to have affected 261,948 Australians. • The information compromised...

The newly discovered backdoor trojan ‘SpeakUp’ infects Linux and MacOS systems

Source: Cyware | By Ryan Stewart • The new Backdoor trojan ‘SpeakUp’ exploits known vulnerabilities in six different Linux systems and even in MacOS. • The...

Decoding a new sample of AdvisorBot malware

Source: Cyware | By Ryan Stewart Decoding a new sample of AdvisorBot malware that is delivered via malicious macros • The malware arrives in a legitimate-looking...

MadIoT botnet attacks could result in power outages and much more

Source: Cyware | By Sophia Brown • This new class of attack majorly focuses on home-automation hubs and stand-alone connected appliances. • MadIoT attacks could result...

Synopsys Releases BSIMM9 Study Highlighting Impact of Cloud Transformation

Synopsys Releases BSIMM9 Study Highlighting Impact of Cloud Transformation and Growth of Software Security Community Latest Iteration of the Building Security In Maturity Model Reflects...

Over 170,000 MikroTik routers were enslaved to launch a massive cryptojacking...

Source: Cyware | By Sophia Brown • The campaign was first observed in Brazil, but later spread to other countries. • A zero-day exploit, discovered in...
- Advertisement -