Malware Hunter Crawls Internet Looking for RAT C2s

A new crawler from Shodan and Recorded Future called Malware Hunter seeks out command and control servers managing endpoints infected with remote access Trojans and other malware. Continue reading Malware Hunter Crawls Internet Looking for RAT C2s

Dan Geer: Cybersecurity, Humanity’s Future ‘Conjoined’

Dan Geer’s Source Boston keynote included a declaration that cybersecurity and humanity’s future are forever conjoined. Continue reading Dan Geer: Cybersecurity, Humanity’s Future ‘Conjoined’

Healthcare Sector Suffers From Lack Of Security Professionals

At Source Boston, Josh Corman of the Atlantic Council said that healthcare is suffering from a lack of security talent, devices rife with vulnerabilities, and government incentivizing bad behavior. Continue reading Healthcare Sector Suffers From Lack Of Security Professionals

Zimperium Acquisition Program Publishes Exploits for Patched Android Bugs

Exploits for patched Android elevation of privilege vulnerabilities were published through the Zimperium N-Days Exploit Acquisition Program. Continue reading Zimperium Acquisition Program Publishes Exploits for Patched Android Bugs

Hyundai Patches Leaky Blue Link Mobile App

Hyundai Motor America patched its Blue Link mobile app after researchers found a cleartext encryption key that could be use to expose user and vehicle information. Continue reading Hyundai Patches Leaky Blue Link Mobile App

NSA’s DoublePulsar Kernel Exploit In Use Internet-Wide

Scans show tens of thousands of Windows servers infected with the DoublePulsar kernel exploit leaked by the ShadowBrokers two weeks ago. Continue reading NSA’s DoublePulsar Kernel Exploit In Use Internet-Wide