US-CERT Warns of Crypto Bugs in IEEE Standard

Weak cryptography in the IEEE P1735 electronics standard allow attackers to recover valuable intellectual property in plaintext from SoCs and integrated circuits. Continue reading US-CERT Warns of Crypto Bugs in IEEE Standard

Know your threats: the nine scariest malware monsters

It’s been a particularly ghoulish year in cybersecurity, from Russian hacks to ransomware outbreaks. The bad boogey man in the black hoodie has been pulling one over the collective public. It’s dark and creepy, but users refuse to stop peeking behind the door. It’s enough to make even the most grizzled IT admin run for…

Categories:

Tags:

(Read more…)

The post Know your threats: the nine scariest malware monsters appeared first on Malwarebytes Labs.

The post Know your threats: the nine scariest malware monsters appeared first on Security Boulevard.

Continue reading Know your threats: the nine scariest malware monsters

Inside the RIG Exploit Kit

In a deep analysis of RIG, Cisco Talos team outlined the way the exploit kit combines different web technologies such as DoSWF, JavaScript, Flash and VBscript to obfuscate attacks. Continue reading Inside the RIG Exploit Kit

New-looking Sundown EK drops Smoke Loader, Kronos banker

In this post we take a quick glance at some changes made to the Sundown exploit kit. The landing page has been tweaked and uses various obfuscation techniques. Sundown is used in some smaller campaigns and in this particular case dropped a downloader f… Continue reading New-looking Sundown EK drops Smoke Loader, Kronos banker