Advanced attack scenarios and sabotage of smart manufacturing environments

Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that Trend Micro analyzed during this research “Past manufacturing cyber attacks hav… Continue reading Advanced attack scenarios and sabotage of smart manufacturing environments

Coronavirus delays trial of alleged Russian hacker a third time

Justice has already been slow in this case, and the pandemic isn’t helping: His trial has been postponed for a third time. Continue reading Coronavirus delays trial of alleged Russian hacker a third time

FBI Takes Down Russia-based Cyber Platform Selling Private Data and Contraband

The Federal Bureau of Investigation (FBI) took down the DEER.IO website, a known cybercrime platform based in Russia, along with Kirill Victorovich Firsov, its alleged administrator. When you hear of personal information stolen in data breaches and sol… Continue reading FBI Takes Down Russia-based Cyber Platform Selling Private Data and Contraband

Spammers Use Coronavirus Message to Deploy Keylogger

Hackers are weaponizing the COVID-2019 coronavirus disease, trying to trick people into downloading malware so attackers can steal valuable information from victims’ computers. Malware deployed through infected emails and files is nothing new. St… Continue reading Spammers Use Coronavirus Message to Deploy Keylogger

Spammers Use Coronavirus Message to Deploy Keylogger

Hackers are weaponizing the COVID-2019 coronavirus disease, trying to trick people into downloading malware so attackers can steal valuable information from victims’ computers. Malware deployed through infected emails and files is nothing new. St… Continue reading Spammers Use Coronavirus Message to Deploy Keylogger

Eclypsium Researchers Demonstrate Direct Memory Attacks

Researchers from Eclypsium, a provider of secure firmware, disclosed this week that they have been able to launch successful direct memory access (DMA) attacks that bypass security frameworks such as UEFI Secure Boot, Intel Boot Guard, HP Sure Start a… Continue reading Eclypsium Researchers Demonstrate Direct Memory Attacks