Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Montana Signs Ban on TikTok Usage on Personal Devices

A TikTok spokesperson said the ban violates the First Amendment rights of Montana residents This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Montana Signs Ban on TikTok Usage on Personal Devices

ChatGPT Leveraged to Enhance Software Supply Chain Security

OX-GPT is designed to help quickly remediate security vulnerabilities during software development This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ChatGPT Leveraged to Enhance Software Supply Chain Security

Government Publishes Playbook to Enhance Smart City Security

Resources are designed to help local authorities mitigate risk This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Government Publishes Playbook to Enhance Smart City Security

New Cloud Data Leak Adds to Capita’s Woes

Colchester council says multiple local authorities are impacted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Cloud Data Leak Adds to Capita’s Woes

Identity Crimes Remain at All-Time High in 2022

Most reports related to Google Voice scams This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Identity Crimes Remain at All-Time High in 2022

Social Engineering Risks Found in Microsoft Teams

The abuse methods require pre-existing access to a compromised user account or Teams token This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Social Engineering Risks Found in Microsoft Teams

BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks

eSentire recommended raising awareness of malware masquerading as legitimate applications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks

Energy Industry Faces Increasing Dark Web Cyber Threats

The claims come from the latest Searchlight Cyber threat intelligence report This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Energy Industry Faces Increasing Dark Web Cyber Threats

Acronis Launches EDR Solution with Potential for AI Integration

Acronis EDR is integrated into its Cyber Protect Cloud solution along with backup and data recovery functionalities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acronis Launches EDR Solution with Potential for AI Integration

Cyber-Resilience Programs Failing on Poor Visibility

Organizations need a better way to build and assess programs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Resilience Programs Failing on Poor Visibility

US Offers $10m Reward For Alleged Prolific Ransomware Actor

Indictments claim Russian was involved in Babuk, Hive and LockBit This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Offers $10m Reward For Alleged Prolific Ransomware Actor

NSO Group Spends Millions Lobbying US Government

Spyware maker wants return to “business as usual” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSO Group Spends Millions Lobbying US Government

Camaro Dragon APT Group Exploits TP-Link Routers With Custom Implant

The implant’s components are designed to be compatible with different firmware from various vendors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Camaro Dragon APT Group Exploits TP-Link Routers With Custom Implant

Lacroix Shuts Three Factories For a Week After Cyber-Attack

The targeted cyber-attack hit activity sites in France, Germany and Tunisia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lacroix Shuts Three Factories For a Week After Cyber-Attack

BEC Attackers Spoof CC’d Execs to Force Payment

Armorblox uncovers another new tactic used by email fraudsters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BEC Attackers Spoof CC’d Execs to Force Payment

Researchers Uncover New “RA Group” Ransomware

Actor is using leaked Babuk code to target firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Uncover New “RA Group” Ransomware

PharMerica Breach Hits Over 5.8 Million Customers

Medical and insurance data exposed in ransomware attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PharMerica Breach Hits Over 5.8 Million Customers

Qilin’s Dark Web Ransomware Targets Critical Sectors

Group-IB’s threat intelligence team said it infiltrated and analyzed Qilin’s inner workings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Qilin’s Dark Web Ransomware Targets Critical Sectors

Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme

The defendant was also ordered to pay $1.6m in restitution and forfeit property used for the crimes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme

Lancefly APT Custom Backdoor Targets Government and Aviation Sectors

Symantec’s Threat Hunter Team said these campaigns have been ongoing for several years This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lancefly APT Custom Backdoor Targets Government and Aviation Sectors

Discord Breached After Service Agent Targeted

Incident impacts user emails and support messages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Discord Breached After Service Agent Targeted

US Says VoIP Firm Delivered Billions of Scam Robocalls

DoJ and FTC take action against XCast Labs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Says VoIP Firm Delivered Billions of Scam Robocalls

PaperCut Software Flaw Sparks Ransomware Attacks, CISA Warns

The bug allowed cyber-criminals to remotely execute malicious code without authentication credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PaperCut Software Flaw Sparks Ransomware Attacks, CISA Warns

Toyota Admits Decade-Long Data Leak Affecting 2.15 Million Customers

Spokesperson Hideaki Homma said the cloud-based service issue affected only vehicles in Japan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Toyota Admits Decade-Long Data Leak Affecting 2.15 Million Customers

Essential Addons Plugin Flaw Exposes One Million WordPress Websites

Patchstack cybersecurity experts described the vulnerability in an advisory published on Thursday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Essential Addons Plugin Flaw Exposes One Million WordPress Websites

Manufacturers Targeted as Ransomware Victim Numbers Spike 27%

Smaller threat groups and coercive tactics are increasingly common This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Manufacturers Targeted as Ransomware Victim Numbers Spike 27%

Software Supply Chain Attacks Hit 61% of Firms

Only half of firms are requesting a software bill of materials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Software Supply Chain Attacks Hit 61% of Firms

Card ‘ID Theft’ Fraud Doubles in 2022

UK Finance figures show growing online menace This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Card ‘ID Theft’ Fraud Doubles in 2022

Threat Actors Use Babuk Code to Build Hypervisor Ransomware

According to SentinelOne, these novel variants emerged between 2022 and 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Threat Actors Use Babuk Code to Build Hypervisor Ransomware

Ransomware Attacks Adapt With New Techniques: Kaspersky Report

Attackers are incorporating key attributes from defunct criminal groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attacks Adapt With New Techniques: Kaspersky Report

NCSC and ICO Dispel Incident Reporting Myths

Keeping attacks a secret only helps the criminals, they warn This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC and ICO Dispel Incident Reporting Myths

Ransomware Group Tries and Fails to Extort Security Vendor Dragos

Threat actors put the pressure on with references to family members This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Group Tries and Fails to Extort Security Vendor Dragos

Bad Bots Now Account For 30% of All Internet Traffic

Figure is highest since records began, says Imperva This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Bad Bots Now Account For 30% of All Internet Traffic

Twitter Hacker Admits Guilt in New York Court, Extradited from Spain

O’Connor faces charges of computer intrusion, extortion, stalking, wire fraud and money laundering This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Twitter Hacker Admits Guilt in New York Court, Extradited from Spain

Cyber-Criminals Exploit Hardware Wallet to Steal Almost $30,000

Kaspersky discovered that the wallet the victim purchased had been tampered with This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Criminals Exploit Hardware Wallet to Steal Almost $30,000

NSA and Allies Uncover Russian Snake Malware Network in 50+ Countries

Cybercriminals used Snake to retrieve confidential documents related to international relations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSA and Allies Uncover Russian Snake Malware Network in 50+ Countries

Ransomware Encryption Rates Reach New Heights

Overall, ransomware infections remain steady, Sophos maintains This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Encryption Rates Reach New Heights

Spanish Police Arrest 40 in Phishing Gang Bust

Organized crime ring used phishing to fund operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Spanish Police Arrest 40 in Phishing Gang Bust

Microsoft Patches Three Zero-Day Bugs This Month

This month’s Patch Tuesday more manageable for sysadmins This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Patches Three Zero-Day Bugs This Month

ISACA: Companies Still Face Many Barriers to Achieving Digital Trust

While ISACA’s concept of digital trust is increasingly recognized as key to digital transformation, business leaders are still faced with many bottlenecks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ISACA: Companies Still Face Many Barriers to…

New Botnet Campaign Exploits Ruckus Wireless Flaw

Tracked CVE-2023-25717, the flaw was recently exploited by the AndoryuBot botnet, says Fortinet This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Botnet Campaign Exploits Ruckus Wireless Flaw

Only 39% of IT Security Decision-Makers See it As Business Enabler

The Delinea report also suggests 36% of them believe cybersecurity is only important for compliance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Only 39% of IT Security Decision-Makers See it As Business Enabler

NextGen Healthcare Data Breach: One Million Patient Records Affected

The breach reportedly affected a database accessed via stolen client credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NextGen Healthcare Data Breach: One Million Patient Records Affected

EU’s Client-Side Scanning Plans Could be Unlawful

Lawyers for the bloc issue warning This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU’s Client-Side Scanning Plans Could be Unlawful

CISOs Worried About Personal Liability For Breaches

Many want insurance to cover any financial impact This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISOs Worried About Personal Liability For Breaches

Operation Power Off: 13 More Booter Sites Seized

Four pleaded guilty to running DDoS-for-hire operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Operation Power Off: 13 More Booter Sites Seized

Five Takeaways From the Russian Cyber-Attack on Viasat’s Satellites

The 2022 AcidRain wiper attack, which shut down satellite services for thousands of people in Ukraine and Western Europe, was extensively discussed during the CYSAT conference in Paris This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Five…

Dallas Police Department Compromised in Ransomware Attack

The attack took down essential services, including some 911 dispatch systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dallas Police Department Compromised in Ransomware Attack

North Korean APT Kimsuky Launches Global Spear-Phishing Campaign

ReconShark is sent via emails containing OneDrive links leading to documents with malicious macros This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean APT Kimsuky Launches Global Spear-Phishing Campaign

Cyber Patrols Lead to Seizure of Stolen Artefacts

Items dating back thousands of years recovered in new crackdown This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber Patrols Lead to Seizure of Stolen Artefacts

Ransomware Actors Extort University Via Alert System

Innovative tactics turn up the heat on Bluefield University This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Actors Extort University Via Alert System

Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns

Malware families detected and disrupted include Ducktail and the newly identified NodeStealer This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns

Android Spyware BouldSpy Linked to Iranian Government

The mobile malware has been used by threat actors to target minority groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Spyware BouldSpy Linked to Iranian Government

Consumer Group Slams Bank App Fraud Failings

Which? wants banks to improve customer outreach and security This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Consumer Group Slams Bank App Fraud Failings

Malicious HTML Attachment Volumes Surge

File type remains the most dangerous in email-borne threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious HTML Attachment Volumes Surge

US Authorities Dismantle Dark Web “Card Checking” Platform

Try2Check helped cyber-criminals test stolen card details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Authorities Dismantle Dark Web “Card Checking” Platform

CISA Advises FCC Covered List For Risk Management

Some of the companies included in the list are Huawei, ZTE, Dahua and China Unicom This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Advises FCC Covered List For Risk Management

Apple and Google Unveil Industry Specification For Unwanted Tracking

The new standard ensures that Bluetooth location-tracking can work with unauthorized tracking detection and alerts on iOS and Android This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple and Google Unveil Industry Specification For Unwanted Tracking

Earth Longzhi Uses “Stack Rumbling” to Disable Security Software

Trend Micro analyzed two separate Earth Longzhi campaigns between 2020 and 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Earth Longzhi Uses “Stack Rumbling” to Disable Security Software

Three-Quarters of Firms Predict Breach in Coming Year

Preparedness is improving, but not by enough This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Three-Quarters of Firms Predict Breach in Coming Year

Government’s New Fraud Strategy Gets Lukewarm Reception

Much-anticipated plan criticized as “too little, too late” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Government’s New Fraud Strategy Gets Lukewarm Reception

Dark Web Bust Leads to Arrest of 288 Suspects

Suspects used Monopoly Market to buy and sell drugs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Bust Leads to Arrest of 288 Suspects

Bitmarck Halts Operations Due to Cybersecurity Breach

Bitmarck does not believe customer data was impacted due to the breach This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Bitmarck Halts Operations Due to Cybersecurity Breach

South Korean Lures Used to Deploy ROKRAT Malware

This shift is not exclusive to ROKRAT but represents a larger trend that became popular in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: South Korean Lures Used to Deploy ROKRAT Malware

Hackers Exploit High Severity Flaw in TBK DVR Camera System

Vulnerability derives from an error the camera experiences when handling a maliciously crafted HTTP cookie This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hackers Exploit High Severity Flaw in TBK DVR Camera System

T-Mobile Reveals Second Breach of the Year

Telco giant says issue began in late February This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: T-Mobile Reveals Second Breach of the Year

UK Gun Owners May Be Targeted After Rifle Association Breach

Unknown number of members compromised in cyber-attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Gun Owners May Be Targeted After Rifle Association Breach

Advanced Fee Fraud Surges by Over 600%

However, computer misuse remains unchanged from before the pandemic This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Advanced Fee Fraud Surges by Over 600%

Ransomware Attack Disrupts IT Network at Hardenhuish School

At the time of writing, it is unclear whether the school paid the ransom This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attack Disrupts IT Network at Hardenhuish School

Global Cyber Attacks Rise by 7% in Q1 2023

Check Point also said the education and research sector experienced the highest number of attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Cyber Attacks Rise by 7% in Q1 2023

Android Apps Fail to Protect User Data During Device Transfer

CloudSEK said that in some applications such as WhatsApp, attackers could also bypass 2FA This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Apps Fail to Protect User Data During Device Transfer

Man Gets Four Years for Stealing Bitcoins Seized by Feds

Individual stole millions subject to forfeiture This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Man Gets Four Years for Stealing Bitcoins Seized by Feds

Minecraft Clones with 35 Million Installs Contained Adware

McAfee discovered HiddenAds Trojan inside 38 copycat mobile games This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Minecraft Clones with 35 Million Installs Contained Adware

Google Bans 173,000 Bad Developers in 2022

Efforts were part of a Google Play fraud and malware crackdown This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Bans 173,000 Bad Developers in 2022

#RSAC: Organizations Warned About the Latest Attack Techniques

A range of experts provide insights into new techniques being used by cyber-threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Organizations Warned About the Latest Attack Techniques

Vietnamese Hackers Linked to ‘Malverposting’ Campaign

Security experts at Guardio Labs discussed the findings in a new blog post This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Vietnamese Hackers Linked to ‘Malverposting’ Campaign

RTM Locker Ransomware Targets Linux Architecture

Security researchers at Uptycs shared the findings in an advisory published on Wednesday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RTM Locker Ransomware Targets Linux Architecture

#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

At RSA, cybersecurity experts discussed the unique nature of software supply chain attacks and approaches to tackling this growing threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

APT Groups Expand Reach to New Industries and Geographies

The findings come from Kaspersky’s latest APT trends report for the first quarter of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT Groups Expand Reach to New Industries and Geographies

Microsoft Blames Clop Affiliate for PaperCut Attacks

Some attacks also linked to LockBit deployment This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Blames Clop Affiliate for PaperCut Attacks

Google Goes After CryptBot Distributors

Info-stealing malware infected over 600,000 machines This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Goes After CryptBot Distributors

#RSAC: Experts Urge Applying Lessons Learned from Russia-Ukraine Cyberwar to Potential China-Taiwan Scenario

As tensions rise between China and Taiwan, US Government officials are keen to implement lessons learned from Ukraine’s cyberwar This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Experts Urge Applying Lessons Learned from Russia-Ukraine Cyberwar to…

Evasive Panda’s Backdoor MgBot Delivered Via Chinese Software Updates

Most of the plugins are designed to steal information from highly popular Chinese applications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Evasive Panda’s Backdoor MgBot Delivered Via Chinese Software Updates

#RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros

ISACA’s Rob Clyde tells Infosecurity about the role of the guidance as well as new findings about cyber insurance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros

Critical Flaw Patched in VMware Workstation and Fusion

A malicious actor with local admin privileges could exploit the vulnerability to escape from the VM This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaw Patched in VMware Workstation and Fusion

Alloy Taurus Hackers Update PingPull Malware to Target Linux Systems

According to Unit 42, the variant uses the same AES key as the original Windows PE malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Alloy Taurus Hackers Update PingPull Malware to Target Linux Systems

New SLP Vulnerability Could Enable Massive DDoS Attacks

Bug has potential to facilitate 2200x amplification attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New SLP Vulnerability Could Enable Massive DDoS Attacks