RESEARCH: The Hole in the Bucket – Attackers Abuse Bitbucket to Deliver an Arsenal of Malware

The Cybereason Nocturnus Research Team is following an active campaign to deliver multiple different types of malware and infect victims all over the world. Due to the unprecedented number of malware types deployed in this attack, the attackers are able to Continue reading RESEARCH: The Hole in the Bucket – Attackers Abuse Bitbucket to Deliver an Arsenal of Malware

Share

Metamorfo banking Trojan has expanded its campaign to target online users’ banking services- Comment

It has been reported that the Metamorfo banking Trojan has expanded its campaign to target online users’ banking services around the world, with the aim of stealing credit card information, finances and other personal details. Like many other hacking campaigns, Metamorfo begins with phishing emails that Continue reading Metamorfo banking Trojan has expanded its campaign to target online users’ banking services- Comment

Share

Cisco Flaws Put Millions of Workplace Devices at Risk

As reported by Wired, researchers say that a crop of recently discovered flaws in Cisco enterprise products—like desk phones, web cameras, and network switches—could be exploited to penetrate deep into corporate networks. Because Cisco dominates the network equipment market, the bugs impact millions of Continue reading Cisco Flaws Put Millions of Workplace Devices at Risk

Share

Bug in Philips Smart Light Allows Hopping to Devices on the Network- Comment

It has been reported that security researchers taking a closer look at the Philips Hue smart bulbs and the bridge device that connects them discovered a vulnerability that helped them compromise more meaningful systems on the local network. Commenting on this, Boris Cipot, Continue reading Bug in Philips Smart Light Allows Hopping to Devices on the Network- Comment

Share

The UK Gov law outlines will provide a necessary first-step in enhancing IoT device security

The UK Government has unveiled new regulatory proposals for the consumer Internet of Things (IoT), forcing the IoT ecosystem to take a more rigorous and conscious approach to cybersecurity. With an estimated 75 billion internet connected devices worldwide forecasted for Continue reading The UK Gov law outlines will provide a necessary first-step in enhancing IoT device security

Share