Chinese APT Group Hits Air-Gapped Systems in Europe with Malware

By Deeba Ahmed
Industrial organizations in Eastern Europe are the prime targets of this data-harvesting campaign.
This is a post from HackRead.com Read the original post: Chinese APT Group Hits Air-Gapped Systems in Europe with Malware
Continue reading Chinese APT Group Hits Air-Gapped Systems in Europe with Malware

So, you want to deploy air-gapped Kubernetes, huh?

So, you want to deploy Kubernetes in an air-gapped environment, but after months of grueling work, you’re still not up and running. Or maybe you’re just embarking on the journey but have heard the horror stories of organizations trying to manage their … Continue reading So, you want to deploy air-gapped Kubernetes, huh?

This Week in Security: Printing Shellz, ms-officecmd, And AI Security

Researchers at f-secure have developed an impressive new attack, leveraging HP printers as an unexpected attack surface. Printing Shellz (PDF) is a one-click attack, where simply visiting a malicious webpage …read more Continue reading This Week in Security: Printing Shellz, ms-officecmd, And AI Security

Research: Stealing data from air-gapped PC by turning RAM into Wi-Fi Card

By Deeba Ahmed
Israeli Researchers Discover New Data Exfiltration Technique by Turning RAM into Wi-Fi Card. Here’s what the researchers have found out.
This is a post from HackRead.com Read the original post: Research: Stealing data from air-gapped PC … Continue reading Research: Stealing data from air-gapped PC by turning RAM into Wi-Fi Card

Side-Channel Attack Turns Power Supply into Speakers

If you work in a secure facility, the chances are pretty good that any computer there is going to be stripped to the minimum complement of peripherals. After all, the fewer parts that a computer has, the fewer things that can be turned into air-gap breaching transducers, right? So no …read more

Continue reading Side-Channel Attack Turns Power Supply into Speakers

Exfiltrating private keys from air-gapped cold wallets

Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security researchers from the Ben-Gurion University of the Negev, Israel, extracting private key… Continue reading Exfiltrating private keys from air-gapped cold wallets