The Chinese Association insists on an information security audit of all chips supplied to the country.
Intel has denied accusations of backdoors in its chips made by the Chinese Cybersecurity Association (CSAC). The Chinese side has previously claimed that since 2008, Intel has been injecting...
Multiple vulnerabilities are found in the network security protocol.
Researchers from Germany have identified vulnerabilities and problems in the Resource Public Key Infrastructure (RPKI) protocol, which, according to scientists, does not yet have sufficient stability and security.
The RPKI...
TL;DR: a considerable number of simple push-button phones present in Russian stores contain unwanted undocumented functions. They can automatically send SMS messages or go online to transmit the fact of purchase and use of the phone (transmitting the IMEI of the phone and IMSI of SIM cards)...
"Assistance to police investigations must be provided at all costs."
The heads of Australia's leading law enforcement and intelligence agencies have issued a call to the top social media companies for more assistance in investigating cases involving terrorism, child exploitation and racist...
How to crack any lock in seconds? S&G and SECURAM know the answer.
According to a recent article in 404 Media, US Senator Ron Wyden accused two of the largest manufacturers of locks for commercial safes of creating backdoor codes in some of their products, which could potentially become a...
The group's strategy from publishing a PoC to installing malware has been identified.
The Magnet Goblin group actively exploits vulnerabilities in public servers to deploy malware on Windows and Linux systems.
The group is targeting 1-day vulnerabilities-publicized security issues that have...
The malware actively uses the Microsoft Azure infrastructure.
According to the latest data from analysts at Mandiant, the Middle East has become the target of an ongoing cyber espionage operation, which uses unique malware targeting the aerospace, aviation and defense industries. According to...
A vulnerability in VPN devices allowed deploying 5 malicious programs at once.
At least 5 different malicious programs were allegedly used by government hackers to gain access to company networks through Zero-Day vulnerabilities in Ivanti Connect Secure (ICS) VPN devices. The attacks took place...
Who is behind the new wave of cyber attacks?
US and Japanese cybersecurity authorities and law enforcement agencies are warning about the actions of the Chinese hacker group BlackTech. This group disrupts network devices by installing specialized backdoors to access corporate networks.
A joint...
Following Qihoo 360, researchers at the Chinese Xitan Laboratory continue a single echelon of large-scale pendosliv, shattering the paradigm of the Western infosec, where evil totalitarian hackers are necessarily attributed only to Russia, China, Iran and North Korea.
A new wave of criticism...
NCC Group warns that even patches may not save you.
Cybersecurity company NCC Group said in a report that nearly 2,000 Citrix NetScaler instances were compromised. Attackers exploited the recently discovered critical vulnerability CVE-2023-3519. Presumably, it was useful for installing web...
Supposedly Iranian government-sponsored cybercriminal groups exploit VPN server vulnerabilities in their malicious campaigns to create backdoors in companies around the world. According to a report by specialists from the Israeli company ClearSky, Iranian cybercriminals are attacking...
Holivars about which operating system is most secure - macOS or Windows are an eternal topic. Most people will say that macOS is more secure, but we'll show you how to create a backdoor on your MacBook in less than two minutes, and then just support the reverse shell with the tools already built...
Backdoors are called one of the varieties of malicious programs, as well as utilities of hidden access to a computer, specially created by developers of any software to perform unauthorized or undocumented actions. The term comes from the English phrase back door, which translates as "back...