Metasploit Framework: A Popular Tool among Cybercriminals

Metasploit Framework: A Popular Tool among Cybercriminals - Cybersecurity news - Emerging Threats
Security experts recently observed an interesting payload deployment using Metasploit against exposed Docker APIs. The framework has a significant advantage of combining any exploit with any payload.

QR Codes Serve Up a Menu of Security Concerns

Quick Response (QR) codes are booming in popularity and hackers are flocking to exploit the trend. As per a new study, people are mostly ignorant of how it can be used to launch digital attacks.

FBI and NSA Expose Drovorub Malware, APT28's Swiss-Army Knife For Hacking Linux

FBI and NSA Expose Drovorub Malware, APT28's Swiss-Army Knife For Hacking Linux - Cybersecurity news - Emerging Threats
The FBI and NSA have raised an alarm against Russia’s elite state-linked hacker group that is targeting Linux Kernel prior to version 3.7 with the new stealth Drovorub malware suite.

(Ether)Oops! - Ethernet-based Wired Networks at Risk

(Ether)Oops! - Ethernet-based Wired Networks at Risk - Cybersecurity news - Emerging Threats
Researchers explored a new attack method that helps an attacker infiltrate targeted networks via faulty Ethernet cables.

OilRig Now Uses DNS-over-HTTPS To Execute Attacks

OilRig Now Uses DNS-over-HTTPS To Execute Attacks - Cybersecurity news - Emerging Threats
An Iranian hacker group was spotted using the DNS-over-HTTPS (DoH) protocol to silently exfiltrate data from hacked networks.

New Risks With Exposed Elasticsearch and MongoDB - Users ‘Meowed’ Without Any Warning

New Risks With Exposed Elasticsearch and MongoDB - Users ‘Meowed’ Without Any Warning - Cybersecurity news - Emerging Threats
A hacker group is targeting unsecured MongoDB instances exposed to the internet, and deleting them without any warning.

Military-Grade Air-Gapped Networks Under Attack

Military-Grade Air-Gapped Networks Under Attack - Cybersecurity news - Emerging Threats
In May 2020, the air-gapped networks of the Taiwanese and Filipino military were targeted by a China-linked group known as Tropic Trooper (or KeyBoy).

Academics steal data from air-gapped systems using PC fan vibrations

Academics from an Israeli university have proven the feasibility of using fans installed inside a computer to create controlled vibrations that can be used to steal data from air-gapped systems.

Radio frequency: An invisible espionage threat to enterprises

The cybersecurity industry has seen an increase in enterprise attacks from vulnerable RF devices.

TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys

The first iteration of TLS – 1.0 – was based upon SSL 3.0, and was published in 1999 by the Internet Engineering Task Force (IETF)

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags