‘New Unix rootkit used to steal data from ATMs’
Hacker collective LightBasin used a new Unix rootkit to steal financial data from ATMs in order to carry out fraudulent transactions.
The activity was discovered by security expert Mandiant. According to the researchers, the LightBasin hackers targeted customers of banks The collective focused o... Read more
Italian government to cease using Russian anti-virus software
Officials say the move is just a precaution and is not based on any security breach.
Italy's government is poised to curb the use of Russian anti-virus software in the public sector in the wake of Russia's invasion of Ukraine. They fear Moscow could hijack the programs to hack key websites, offi... Read more
Konfir raises £1.6 million to improve employee verification process in Europe
Konfir – a UK-based B2B SaaS platform – has raised funding worth £1.6 million to improve its product, engineering, and go-to-market abilities.
A London-based SaaS platform providing income verifications and instant employment, Konfir raised £1.6M in funding. The lead investor for the pre-s... Read more
HighPoint provides API security services with Noname Security
Noname Security and HighPoint are partnering up. HighPoint will use Noname Security's API Security Platform to provide security services to its customers.
Noname Security develops a platform for securing APIs. The solution takes inventory of all APIs in an environment to find threats, attacks an... Read more
New Linux botnet exploits Log4j
The malware uses DNS tunneling for communications
A recently discovered botnet under active development targets Linux systems, attempting to ensnare them into an army of bots ready to steal sensitive info, installing rootkits, creating reverse shells, and acting as web traffic proxies.
The ne... Read more
The past 3 months have seen dozens of ransomware variants used in 722 attacks
Threat analysts saw 722 different ransomware strikes utilizing 34 different variations in Q4 of 2021, indicating that the ransomware landscape was quite active.
This flurry of activity makes it difficult for defenses to keep track of individual group strategies, signs of vulnerability, and ... Read more
SentinelOne acquires Attivo Networks, expands Singularity XDR
SentinelOne intends to acquire Attivo Networks for 616.5 million dollars (562 million euros). SentinelOne will integrate Attivo Networks' identity security technology in Singularity XDR.
Attivo Networks develops identity security software. Some modules protect against login theft, privilege esca... Read more
Researcher uses 379-year-old algorithm to crack crypto keys
The method used was first introduced by a French mathematician in the 1600's.
Cryptographic keys generated with older software now owned by technology company Rambus are weak enough to be broken instantly using commodity hardware, according to a report in Ars Technica. The revelation was made by... Read more
QNAP warns of severe Linux bug
The vulnerability affects most of the company's NAS devices.
Taiwan-based hardware vendor QNAP warns most of its Network Attached Storage (NAS) devices are impacted by a high severity Linux vulnerability dubbed 'Dirty Pipe' that allows attackers with local access to gain root privileges.
The&... Read more
German security watchdog BSI urges public to stop using Kaspersky
German cybersecurity watchdog BSI calls on the German public to stop using Kaspersky's antivirus software. According to BSI, the software puts Germany at risk of Russian cyberattacks.
BSI claims that Kaspersky Antivirus is suited for carrying out large-scale cyberattacks. BSI fears that Russian ... Read more