Tag
#intel
Open source security expert warns there is still a ‘long road’ ahead to prepare for the next attack wave
As new details about the scope of the sabotage emerge, the perpetrators—and the reason for their vandalism—remain unknown.
Ubuntu Security Notice 5529-1 - It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service in the host OS.
The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities.
Data science can be used to improve access to government assistance while reducing fraud.
Google Cloud pledges experts and other resources to Health Information Sharing and Analysis Center, a community of healthcare infrastructure operators and owners.
Governance, risk, and compliance (GRC) are top-of-mind for many cybersecurity decision-makers. Learn why GRC is important - and how it make it easier. The post The winding road to compliance appeared first on Malwarebytes Labs.
While cybersecurity and foreign meddling remain priorities, domestic threats against election workers have risen to the top of the list.
The cyber campaign, aimed at siphoning funds, uses an improved version of the malware, which can adjust infection paths based on recognized antivirus software.
Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, DDoS and RDP.