Tag: Attacks
-
Akamai Talks Massive Uptick in Credential-Stuffing Attacks Against Bank APIs
Cybercriminals continue to firehose financial services companies with new and innovative cyberattacks. Research from Akamai recently found …
-
Hackers Attack Windows Users with Info-Stealer Malware via Weaponized MS Word Documents
Researchers from X-Force uncovered a malicious campaign with Info-stealer called “Raccoon” and “KPOT” that targets the Windows …
-
Why CSP Isn’t Enough to Stop Magecart-Like Attacks
2019 left enterprises scrambling for security measures to tackle new threats such as formjacking and targeted attacks perpetrated by the …
-
More Than Half of IoT Devices Vulnerable to Severe Attacks
More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are …
-
High Voltage Attack: EU’s Power Grid Organisation Hit by Hackers
The organisation responsible for overseeing the operations of Europe’s high voltage power infrastructure has been hacked. ENTSO-E, formed …
-
The Graham-Blumenthal Bill Is an Attack on Online Speech and Security
Members of Congress have mounted a major threat to your freedom of speech and privacy online. Senators Lindsey Graham (R-SC) and Richard …
-
Poor Rowhammer Fixes On DDR4 DRAM Chips Re-Enable Bit Flipping Attacks
Remember rowhammer vulnerability? A critical issue affecting modern DRAM (dynamic random access memory) chips that could allow attackers to …
-
Researchers Develop New Side-Channel Attacks on Intel CPUs
Security researchers have discovered yet another way that attackers can take advantage of a performance optimization technique in modern …
-
New Intel CPU Vulnerability: Is “Load Value Injection” A Real Threat?
An international team of security researchers has discovered a novel new way to make Intel CPUs leak data to a remote attacker across …
-
New flaw in Intel chips lets attackers slip their own data into secure enclave
A new flaw in Intel chips threatens to allow attackers to not just view privileged information passing through the system but potentially …
-
Spear-Phishing Attack Lures Victims With ‘HIV Results’
Recently discovered spear-phishing emails are using a unique “scare-factor” lure to convince victims to open attached malicious …
-
A decade’s worth of AMD chips offer data takeaway via a side channel but AMD yawns and says ‘meh, not an issue’
AMD processors sold between 2011 to 2019 are vulnerable to two side-channel attacks that can extract CPU kernel data and secrets, according …
●●●