We look at a stealthy RAT attack focusing on e-commerce Linux servers called CronRAT which does some inventive things with dates.
Google has announced projects to ensure the integrity of open source supply chains, and to bring the Rust language to the Linux kernel
In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
News of attacks come and go so fast, sometimes it’s hard to keep track. We’ve done the work for you, sifting through scores of reports to bring you a compilation of digital crimes that are on the rise and what you can do to protect yourself.
The first Mac malware of 2017 was discovered by an IT admin, who spotted some strange outgoing network traffic from a particular Mac. This led to the discovery of a new piece of malware unlike anything I’ve seen before and the first new piece of malware for the Mac in 2017.
If you follow cybersecurity news, you may have heard of the latest Linux exploit referenced under CVE-2016-5195, which has been dubbed Dirty COW. The name is derived based on the exploitation of the copy-on-write (COW) mechanism in Linux.
What is UEFI and its predecessor the MBR? What challenges are there to get a dual boot environment with an alternative operating system?