Security News

Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.

A threat actor was observed targeting Drupal vulnerabilities patched earlier this year to install a backdoor on compromised servers, IBM reports. read more

Many US companies, including Amazon and Apple, have been the victims of a clever supply chain attack that resulted in compromised hardware (servers) being installed at some of their facilities, an...

Earlier this month, I wrote about a statement by the Five Eyes countries about encryption and back doors. (Short summary: they like them.) One of the weird things about the statement is that it...

ESET security researchers have analyzed a new backdoor used by the Russian-speaking advanced persistent threat (APT) group known as Turla. read more

FBI's Latest Backdoor Push Involves Facebook Messenger, Reuters ReportsIt's déjà vu "FBI vs. Apple" all over again, as Reuters reports that the Justice Department is seeking to compel Facebook to...

If you're not already suffering from Black Hat/DEF CON overload Roundup It's time for another rapid roundup of computer security news beyond what we've already reported.…

Dive into a weird and wonderful 'feature' of Via's embedded hardware chips Black Hat A forgotten family of x86-compatible processors still used in specialist hardware, and touted for...

Remote management a double-edged sword, IT admins warned at hacking conference Black Hat Data centers are vital in this cloudy world – yet little-understood management chips potentially give...

We don't know if this is error or deliberate action, but five backdoors have been discovered already this year....