Live demo, plain English, no sales pitch, just a chance to watch an attack dissected in safety. Join us if you can!
Read moreRemotely Controlling Touchscreens
June 2 2022Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting:
The core idea is to take advantage of the electromagnetic signals to execute basic touch...
Read more
Malware-Infested Smart Card Reader
May 26 2022Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and use them. But by all...
Read moreMore supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.
Read moreResearchers have demonstrated iPhone malware that works even when the phone is fully shut down.
t turns out that the iPhone’s Bluetooth chip — which is key to making...
Read more
New Sophisticated Malware
May 4 2022Mandiant is reporting on a new botnet.
The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth....
Read more
Latest episode - listen now!
Read moreZero-Day Vulnerabilities Are on the Rise
April 27 2022Both Google and Mandiant are reporting a significant increase in the number of zero-day vulnerabilities reported in 2021.
Google:
2021 included the detection and disclosure of 58 in-the-wild 0-days,...
Read more
Industrial Control System Malware Discovered
April 14 2022The Department of Energy, CISA, the FBI, and the NSA jointly issued an advisory describing a sophisticated piece of malware called Pipedream that’s designed to attack a wide range...
Read moreA Russian cyberweapon, similar to the one used in 2016, was detected and removed before it could be used.
Key points:
- ESET researchers collaborated with CERT-UA to analyze the attack... Read more

Recent Comments