Cyber criminals look to exploit Intel vulnerabilities for highly persistent implants
Leaked Conti information show the ransomware gang likely completed a proof of concept to exploit Intel ME and rewrite its firmware.
Leaked Conti information show the ransomware gang likely completed a proof of concept to exploit Intel ME and rewrite its firmware.
The Conti ransomware group is less likely to help victims restore encrypted files and more likely to leak exfiltrated data.
The actively exploited flaw allows attackers to use malicious Word documents to perform remote code execution through Microsoft Support Diagnostic Tool.
The paid Assured Open Source Software service will offer common open source packages after vetting the provenance of its code and dependencies.
Malware researchers warn about a stealthy backdoor program that has been used by a Chinese threat actor to compromise Linux servers around the world.
The network switch vulnerabilities are considered critical and could allow attackers to break network segmentation, exfiltrate data, and escape captive portals.
Although the vulnerabilities were patched server-side, they allowed privilege escalation and authentication bypass.
Among the over 100 vulnerabilities fixed by Microsoft during the past week in its monthly patch cycle is one that has the security community very worried.
The new cryptomining malware is written in Go for easier deployment and uses Amazon Web Services' own open-source Go libraries.
A new ransomware operation dubbed LokiLocker has slowly been gaining traction since August among cyber criminals, researchers warn.
The dangerous Linux privilege escalation flaw dubbed Dirty Pipe that was recently disclosed could also impact applications and systems.
The Axeda platform, used by hundreds of Internet of Things devices, has seven vulnerabilities, three of which allow for remote code execution.
Security researchers have found several vulnerabilities affecting many models of APC Smart-UPS uninterruptible power supplies that could be exploited.
The hacker group that recently broke into systems belonging to Nvidia has released two of the company's old code-signing certificates.
Ransomware group's claims follow a threat from the hacktivist group Anonymous to conduct cyber attacks against Russian targets.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO, IBM ASEANZK