Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one network can have from another,… Continue reading Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Indian iPhone Spy Campaign Used Fake MDM Platform

Cyberattackers have used a bogus mobile device management (MDM) system to target a small – but presumably high-value – set of iPhones in India in a cyberespionage campaign that has some unusual hallmarks. Continue reading Indian iPhone Spy Campaign Used Fake MDM Platform

Covert Data Channel in TLS Dodges Network Perimeter Protection

Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections. Continue reading Covert Data Channel in TLS Dodges Network Perimeter Protection

Covert Data Channel in TLS Dodges Network Perimeter Protection

Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections. Continue reading Covert Data Channel in TLS Dodges Network Perimeter Protection

Sowbug Cyberespionage Group Hits South America, South Asia

Security researchers have identified a cyberespionage group that has been stealing data from policy and diplomatic organizations in South America and South Asia since at least 2015. “While cyberespionage attacks are often seen against targets in the U.S., Europe, and Asia, it is much less common to see South American countries targeted,” researchers from Symantec..

The post Sowbug Cyberespionage Group Hits South America, South Asia appeared first on Security Boulevard.

Continue reading Sowbug Cyberespionage Group Hits South America, South Asia

Telegram-Controlled Hacking Tool Targets SQL Injection at Scale

The Katyusha Scanner can find SQL injection bugs at scale, and is managed via the Telegram messenger on any smartphone. Continue reading Telegram-Controlled Hacking Tool Targets SQL Injection at Scale