Servers running Digium Phones VoiP software are getting backdoored

Getty Images reader comments 10 with 9 posters participating Share this story Servers running the open source Asterisk communication software for Digium VoiP services are under attack by hackers who are managing to commandeer the machines to install web shell interfaces that give the attackers covert control, researchers have reported. Researchers from security firm Palo […]

Hackers are targeting industrial systems with malware

Getty Images reader comments 12 with 12 posters participating Share this story From the what-could-possibly-go-wrong files comes this: An industrial control engineer recently made a workstation part of a botnet after inadvertently installing malware advertising itself as a means for recovering lost passwords. Lost passwords happen in many organizations. A programmable logic controller—used to automate […]

Cryptocurrency flowing into “mixers” hits an all-time high. Wanna guess why?

Getty Images reader comments 37 with 23 posters participating Share this story The amount of cryptocurrency flowing into privacy-enhancing mixer services has reached an all-time high this year as funds from wallets belonging to government-sanctioned groups and criminal activity almost doubled, researchers reported on Thursday. Mixers, also known as tumblers, obfuscate cryptocurrency transactions by creating […]

Microsoft wins deal to serve ads on Netflix, edging out Comcast and Google

reader comments 26 with 21 posters participating Share this story Netflix has hired Microsoft to provide the advertising technology for the streaming service’s planned ad-supported tier, the companies announced Wednesday. Comcast’s NBCUniversal subsidiary and Google were reportedly “top contenders” to serve ads on Netflix before Microsoft won the contract. Microsoft will be the “global advertising technology […]

Vulnerabilities allowing permanent infections affect 70 Lenovo laptop models

reader comments 1 with 1 posters participating Share this story For owners of more than 70 Lenovo laptop models, it’s time once again to patch the UEFI firmware against critical vulnerabilities that attackers can exploit to install malware that’s nearly impossible to detect or remove. The laptop maker on Tuesday released updates for three vulnerabilities […]

Ongoing phishing campaign can hack you even when you’re protected with MFA

Getty Images reader comments 10 with 9 posters participating Share this story On Tuesday, Microsoft detailed an ongoing large-scale phishing campaign that can hijack user accounts when they’re protected with multi-factor authentication measures designed to prevent such takeovers. The threat actors behind the operation, who have targeted 10,000 organizations since September, have used their covert […]

New working speculative execution attack sends Intel and AMD scrambling

reader comments 24 with 20 posters participating Share this story Some microprocessors from Intel and AMD are vulnerable to a newly discovered speculative execution attack that can covertly leak password data and other sensitive material, sending both chipmakers scrambling once again to contain what is proving to be a stubbornly persistent vulnerability. Researchers from ETH […]

Russian ‘hacktivists’ are causing trouble far beyond Ukraine

Getty Images | Sergey Balakhnichev reader comments 4 with 4 posters participating Share this story The attacks against Lithuania started on June 20. For the next 10 days, websites belonging to the government and businesses were bombarded by DDoS attacks, overloading them with traffic and forcing them offline. “Usually the DDoS attacks are concentrated on […]