A researcher at the Security Analyst Summit described the insecure state Samsung’s Tizen operating system.
Apache Struts 2 Exploits Installing Cerber Ransomware
Attackers are attempting to exploit the recent Apache Struts vulnerability on Windows servers and the payload is a variant of the Cerber ransomware.
Creating a More Altruistic Bug Bounty Program
David Jacoby and Frans Rosén said at this year’s Security Analyst Summit they offered companies free pen-testing and raised $15,000 for charity in the process.
Baseband Zero Day Exposes Millions of Mobile Phones to Attack
A previously undisclosed baseband vulnerability impacting Huawei smartphones, laptop WWAN modules and IoT components was revealed Thursday at the Infiltrate Conference
Chrome Security Team Tackles ‘Friendly Fire’ To Keep Browser Safe
Justin Schuh, lead engineer of Chrome Security, said ensuring browser security for Chrome users is a balancing act juggling OEM pressures, questionable certificate authorities and quashing third-party software incompatibility issues.
Security Analyst Summit 2017 Day Two Recap
Mike Mimoso and Chris Brook recap the second day of Kaspersky Lab’s Security Analyst Summit, including how a Brazilian bank was compromised, and more.
New RAT Targets Koreans And Is Skilled At Evading Detection
Cisco Talos researchers spot a stealthy new remote administration tool calling ROKRAT that targets Korean-language Microsoft Word alternative Hangul Word Processor.
Android Variant of Notorious Pegasus Spyware Found
Researchers say a variant of the notorious surveillance software called Pegasus has been targeting Android users allowing third parties to take screenshots, capture audio, read email and exfiltrate data from targeted phones.
Fake SEO Plugin Used In WordPress Malware Attacks
Malware that passes itself off as a WordPress SEO plugin has been infecting sites and opening a backdoor for hackers on thousands of sites.
Memory Corruption Mitigations Doing Their Job
At the Security Analyst Summit, Mark Dowd described how memory corruption mitigations are successfully driving up exploit development costs.