It seems to be the season of sophisticated supply-chain attacks. ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company's official API and file-hosting servers.
A Flash Player emulator called 'Ruffle' allows you to play your archived Flash games without fear of being attacked as you browse the web. Later that month, a kill switch in Adobe Flash Player came alive that prevents Flash content in the player.
ESET researchers have discovered that the updating mechanism of NoxPlayer, an Android emulator for Windows and macOS, made by Hong Kong-based company BigNox, was compromised by an unknown threat actor and used to infect gamers with malware. NoxPlayer is used by gamers from over 150 countries around the globe according to BigNox but, as ESET found in January 2021, the supply-chain attack was focused on infecting only Asian gamers with at least three different malware strains.
This software upgrade is available at no cost to all Rocket terminal emulation customers, including BlueZone and Passport, as part of the company's commitment to delivering the most feature-rich, configurable and modern host access for mission-critical systems. While many users access these systems through enhanced user interfaces, many daily users, system administrators and power users interact directly with these applications through an emulator that enables access through a PC or mobile device.
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced a new PROPSIM channel emulation solution that enables the aerospace industry to efficiently verify radio links critical to satellite communications, earth observation, security surveillance, mapping and navigation. Keysight's new channel emulation capabilities address a rapidly expanding satellite market projected to generate more than $2B by 2030, according to a report published in July 2019 by BIS Research.
A security audit funded by Mozilla has led to the discovery of a critical remote command execution vulnerability in the popular iTerm2 macOS terminal emulator. read more
A serious denial-of-service (DoS) vulnerability has been found in Schneider Electric’s Triconex TriStation Emulator software. The vendor has yet to release a patch, but assured customers that the...
Applied Risk ICS Security Consultant Tom Westenberg discovered a DoS vulnerability in an emulated version of the Triconex TriStation Software Suite. Triconex is a Schneider Electric brand which...