Roaming Mantis Campaign

What happened? A new cyber campaign involving poorly configured and vulnerable routers was exploited to infect several thousand Android smartphones. The malware dubbed “Roaming Mantis” infects Android smartphones by using DNS hijacking techniques as its distribution method. It is able to redirect users to malicious Continue Reading

Ledger Cryptocurrency Wallet Flaw

What happened? Security researcher, Saleem Rashid discovered a critical flaw in cryptocurrency wallet hardware created by the company, Ledger. A hardware wallets purpose is to protect a users cryptocurrency private wallet address from being stolen by malicious software located on a computer. It prevents the Continue Reading

Critical Flaws in AMD Zen Architectures

A set of critical vulnerabilities were recently discovered in AMD’s Zen processor line not unlike Intel’s Meltdown/Spectre. Israeli based security researchers from CTS Labs had released a white paper reporting their findings and concerns while redacting any technical details to prevent their tests from being Continue Reading

Memcached Server Attacks

The past few days saw an increase in distributed denial of service(DDoS) attacks involving Memcached servers which were noticed by security researchers Cloudflare, Arbor Networks and Chinese internet security company Qihoo 360. They reported that the attacks had spiked between February 25th, and February 27th. Continue Reading

CrossRAT, A new cross platform malware

A detailed security research report on the advanced persistent threat, Dark Caracal was published by Lookout and the Electronic Frontier Foundation(EFF) on January 18, 2018. The report contained background information about the group as well as many of the components and tools they had at Continue Reading

Skygofree “Are You Being Watched?”

Kaspersky Labs released a technical document on January 16th, 2018 regarding the discovery of a powerful Android spyware, Skygofree. Having been continuously developed since the end of 2014 its functionality and features have grown it into one of the most advanced surveillance tools around. A Continue Reading