Microsoft Seizes Domains Set Up by Russian Cyberspies

Microsoft has seized six domains that were registered by Russian cyberespionage group Fancy Bear and mimicked the websites of U.S. political organizations and think tanks. “One appears to mimic the domain of the International Republican Institut… Continue reading Microsoft Seizes Domains Set Up by Russian Cyberspies

IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear

A team of researchers has found vulnerabilities in implementations of the Internet Key Exchange version 1 (IKEv1) protocol in firewalls and other networking gear that support IPsec VPN tunnels. If exploited, the flaw can allow attackers to bypass auth… Continue reading IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information. The vulnerability, known as Foreshadow or L1 Terminal Fault (L1TF), has three v… Continue reading New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions. Under the Android security model each application runs inside a sandbox, which… Continue reading Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Industrial Control Gateways: It’s Like Exploiting in the 1990s

Industrial control gateways play a critical role in industrial infrastructure, linking systems and sensors that communicate using protocols such as Modbus or serial to IP networks for easier remote management and monitoring. However, many such devices… Continue reading Industrial Control Gateways: It’s Like Exploiting in the 1990s

Asian Dark Web Communities Thrive on Cultural Differences

A new report sheds light on the little-understood dark web markets in Asia, showing how they’re driven by cultural differences and local government policies. Researchers from IntSights Cyber Intelligence have investigated dark web cybercrime web… Continue reading Asian Dark Web Communities Thrive on Cultural Differences

New WPA2 Attack Can Compromise Wireless Networks

Researchers have found a new and easier way of attacking wireless networks protected by the WPA2 security standard that could work against certain routers with roaming enabled. The new technique was discovered by Jens Steube, the lead developer of the… Continue reading New WPA2 Attack Can Compromise Wireless Networks

170K+ MikroTik Routers Inject Cryptomining Script

A hacker has managed to compromise more than 170,000 routers made by MikroTik and uses them to inject browser-based cryptomining scripts into legitimate websites visited by users. According to Simon Kenin, a researcher a Trustwave who spotted and inve… Continue reading 170K+ MikroTik Routers Inject Cryptomining Script

Iran-Linked RASPITE Group Targets U.S. Electric Utilities

A known threat group believed to be based in Iran is trying to gain access to computer infrastructure belonging to U.S. electric utility organizations. The group, which researchers from industrial control systems (ICS) security firm Dragos track as RA… Continue reading Iran-Linked RASPITE Group Targets U.S. Electric Utilities

US Charges 3 Members of the Notorious FIN7 Cybercriminal Group

The U.S. Department of Justice announced charges against three leading members of a cybercriminal group called FIN7 that hacked into more than 100 U.S. businesses. The three men are Ukrainian nationals and are already in custody. FIN7, also known as C… Continue reading US Charges 3 Members of the Notorious FIN7 Cybercriminal Group