by Beck Bailey | Sep 10, 2024 | RSS
A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio gap” and exfiltrating sensitive information by taking advantage of the noise generated by the pixels on the screen. “Malware in the...
by Beck Bailey | Sep 10, 2024 | RSS
The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the deployment of next-stage payloads, according to new findings from Trend Micro. The cybersecurity firm, which is monitoring...
by Beck Bailey | Sep 10, 2024 | RSS
From phishing scams to ransomware attacks, discover what these threats look like and how you can protect yourself and your business.
by Beck Bailey | Sep 9, 2024 | RSS
A novel side-channel attack has been found to leverage radio signals emanated by a device’s random access memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks. The technique has been codenamed RAMBO by Dr. Mordechai Guri, the...
by Beck Bailey | Sep 9, 2024 | RSS
The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are adequately...
Recent Comments