Researchers News, Articles and Updates

Patched Cisco flaw lets attackers perform MITM attacks, steal credentials

Positive Technologies has elaborated on a critical remote code execution vulnerability its researchers discovered in the web interface of the Cisco Systems Access Control Server (ACS).

Update: Subdomain flaw puts users at risk

Security researchers are reporting a phishing attack technique which hackers may be using in the wild, and could put websites at risk of attack.

Trickbot and IcedID team up to boost revenues from victims

The botnet operators behind IcedID and Trickbot are collaborating with each other and possibly sharing their ill-gotten gains, according to security researchers.

Blockchain platform EOS found containing critical security vulnerabilities

Security researchers have uncovered several security vulnerabilities in blockchain platform EOS, some of which can be exploited by hackers to remotely execute arbitrary code on EOS nodes.

Open Bug Bounty creates free bug bounty programme

Open Bug Bounty has added a free service that will allow organisations to create their own bug bounty programme.

Flaw in Git could result in remote code execution

Vulnerability patched in Git source code versioning software. Security researchers have discovered a number of flaws in Git that could have enabled hackers to run remote code on a victim's PC.

Cobalt Hacking Group continues despite leader arrest

Banking hacking group Cobalt continues to operate despite the arrest of a leading figure recently, according to researchers.

Researchers find easily-exploitable vulnerabilities in BMW's in-car systems

Security researchers at Tencent's Keen Security Lab have revealed that Internet-connected systems in several BMW cars feature vulnerabilities that allow malicious actors to hack into such vehicles via a set of remote attack surfaces.

Researchers find abundance of legitimate apps used to stalk intimate partners

Researchers from Cornell Tech, NYU, Technion, Cornell University, and Hunter College conducted what was described as the first large-scale study of apps used by stalkers to track their intimate partners.

Satori botnet searching internet for open Ethereum mining rigs

Increasing value of cryptocurrency sees hackers look out for mining hardware. Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs.

Critical PGP/GPG, S/MIME vulnerabilities require immediate action

A group of European security researchers readied the release of a paper for early 15 May detailing vulnerabilities in PGP/GPG and S/MIME email encryption that could reveal the plaintext of encrypted emails.

38 "games and educational apps" kicked out from Google Play Store

Security researchers recently discovered the presence of 38 malicious apps on the Google Play Store that were not only disguised as games and education apps but also redirected victims to install other apps from the Play Store.

Hide and Seek IoT botnet re-emerges

Security researchers have discovered a new form of the Hide and Seek IoT malware. The latest version can now survive a reboot of the infected device.

Fake Android AV app re-emerges

Armor for Android resurfaces as Android's Antivirus. A fake anti-virus app has re-emerged on Android devices, according to security researchers.

Malicious Monero miner spreads via arsenal of web server exploits

Researchers have discovered a versatile cryptominer worm that propagates itself by exploiting vulnerabilities in Microsoft's SMBv1 server, Oracle's WebLogic Server and Apache Struts.

Zero-Day vulnerability found in two Schneider Electric ICS products

Tenable Security researchers have revealed a Zero Day flaw in two Schneider Electric industrial controllers that if exploited could give an attacker an attack the ability to remotely execute code with high privileges.

Millions of fibre broadband routers open to remote control by hackers

Critical vulnerability allows attackers to bypass authentication. Security researchers have found flaws in fibre-optic broadband routers that enable hackers to bypass security and takeover devices.

GravityRAT malware detects virtualised environments using infected machines

A previously unidentified remote access tool (RAT) primarily targeting Indian organisations uses seven different techniques for sniffing out researchers' virtual machines and sandbox environments.

PoC code can crash Windows systems, even when locked

Security researchers have found a flaw in Windows that could allow hackers to crash a system when they insert a USB stick with specially crafted code. The problem happens even when Windows is locked.

Amazon Echo made to eavesdrop without exploit or manipulation

Checkmarx security researchers developed a proof of concept attack that would allow and enable an Amazon Echo to continue recording a user long after a request is made.

Security researchers discover way to hack into any hotel room

F-Secure finds millions of hotel rooms at risk from hackers. The key card given out by hotels to guests to access their rooms may not be as secure as thought.

Updated 'SquirtDanger' versatile malware - author Russian hacker TheBottle

Update: Russian hacker TheBottle investigated by Palo Alto's Unit 42 researchers whic identified a new botnet malware family SquirtDanger described as "Swiss Army Knife Malware".

Orangeworm attacks X-Ray machines in campaign spanning UK, Europe, US

A new attack group - Orangeworm - targeting the healthcare sector and related industries has been spotted by security researchers from Symantec.

IoT botnet actively exploiting Drupal CMS bug

Botnet uses compromised systems to spread infection. Security researchers have discovered a large botnet that is using a severe flaw in the Drupal CMS in order to infect other systems.

Ransomware has generated about £3.3 million in bitcoin for its distributors

Two Italian researchers from the University of Padua have compiled an estimate of how much money, in bitcoin, has been generated by the various types of ransomware used by cyber-criminals.

Now your brain can be hacked to kill you; neurostimulator implants at risk

Academic researchers have discovered that brain implants, known as neurostimulators, can be hacked and could prevent patients from "speaking or moving, cause irreversible damage to his brain, or even worse, be life-threatening".

Lazy hackers employ gruntbots to quickly breach network defences

Researchers at Cybereason have been analysing a complex network honeypot operation, and the results should make every CISO pause for thought.

New hacker groups emerging in Asia and in the Middle East, finds Kaspersky

Security researchers observed a noticeable spurt in the activities of advanced persistent threat (APT) groups based in certain parts of Asia and in the Middle East during the first three months of the year.

Hackers using flaw in Cisco switches to attack

US Homeland Security warned Russian state actors behind attacks on US energy grid. Security researchers have warned that hackers are using badly-configured Cisco switches to gain entry into the infrastructure of organisations.

Should LinkedIn follow Facebook's lead in data restriction controls?

Facebook's recent announcement to update its data restriction policies has prompted some researchers to examine other social media platforms to review their data practices as well.