Cobalt cybercrime group might be launching Magecart skimming attacks
Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars.
Lucian Constantin | 04 Oct | Read more
Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars.
Lucian Constantin | 04 Oct | Read more
A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain.
Lucian Constantin | 03 Oct | Read more
IBM researchers discover new Magecart scripts suggest planned advertisement injection through Wi-Fi and supply chain attacks.
Lucian Constantin | 25 Sep | Read more
Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack.
Lucian Constantin | 18 Sep | Read more
Researchers were able to achieve amplification rates of up to 15,300%. Some mitigations are possible.
Lucian Constantin | 18 Sep | Read more
The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere.
Lucian Constantin | 14 Sep | Read more
NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks.
Lucian Constantin | 11 Sep | Read more
Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.
Lucian Constantin | 05 Sep | Read more
Security researchers have found a way to attach virtual USB devices remotely to Supermicro servers, including over the internet, by abusing a feature in their baseband management controller software.
Lucian Constantin | 04 Sep | Read more
According to new research, more companies are enabling biometric authentication on devices to verify access requests.
Lucian Constantin | 17 Jul | Read more
MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised.
Lucian Constantin | 18 Jun | Read more
Unlike Rowhammer, which only allows for data corruption, the newly discovered RAMBleed vulnerability provides a way to grab data such as encryption keys from memory.
Lucian Constantin | 13 Jun | Read more
Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of how they did it at one bank.
Lucian Constantin | 07 Jun | Read more
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.
Lucian Constantin | 23 May | Read more
A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication.
Lucian Constantin | 16 May | Read more