Malicious code discovered in Linux distributions
A backdoor implanted into XZ Utils has found its way into popular Linux distributions.
1278 articles
A backdoor implanted into XZ Utils has found its way into popular Linux distributions.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
Researchers claim to have found a way to recover a fingerprint by… eavesdropping on a user swiping a finger across the screen!
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
A vulnerability in the glibc library affects most major Linux distributions.
Features of embedded systems and suitable protection methods for them.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.