A newly observed RIG exploit kit campaign leverages outdated versions of popular applications such as Flash, Internet Explorer, or Microsoft Edge to distribute the Cerber ransomware, Heimdal Security warns.
A report emerged on Friday that the popular mobile messaging app WhatsApp packs a backdoor allowing its operator (Facebook) to tap into users’ end-to-end encrypted conversations, but experts have refuted the claim as an exaggeration and F.U.D.
The mysterious hacking group calling themselves “The Shadow Brokers” has apparently decided to put an end to their failed attempts to sell exploits and hacking tools they claimed to have stolen from the NSA-linked Equation Group.
The RIG exploit kit (EK) managed to grab nearly 35% of the overall EK activity during the last month of 2016, retaining the leading spot in the landscape for the fourth month in a row, Symantec reports.
A vulnerability recently addressed in Google’s January 2017 Android security bulletin was a denial of service (DoS) flaw in bootloader, which could be exploited to target Nexus 6 and 6P custom boot modes, IBM security researchers reveal.
Referred to as “ghost host,” a new technique involves the inclusion of unknown host names in the HTTP host fields of a botnet’s communication to ensure their command and control (C&C) servers aren’t blocked by security systems.