article thumbnail

Safer with Google: Advancing Memory Safety

Google Security

We are also conducting ongoing research into Capability Hardware Enhanced RISC Instructions (CHERI) architecture which can provide finer grained memory protections and safety controls, particularly appealing in security-critical environments like embedded systems. The security architecture of the chromium browser." Technical report.

article thumbnail

IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia

SecureList

However, this transition to a modular architecture isn’t something new as we have seen modular versions of the MysterySnail RAT deployed as early as 2021. Allows reading files, managing services, and spawning new processes. 2 PMod process.dll Allows listing and terminating running processes.

Malware 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. There was no allegation or evidence that any unauthorized access to customers’ video occurred as a result of the architecture.” Cisco is going to pay $8.6

article thumbnail

Ragnar Locker Ransomware targets Greece Gas Company

CyberSecurity Insiders

NOTE- Donuts Leaks, a new data extortion group is also linked to Ragnar Locker and is responsible to target Sheppard Robson, the UK-based Architectural company, and Construction giant Sando and the same group was responsible to announce to the world the digital attack on DESFA.

article thumbnail

Iran-linked APT is exploiting the Zerologon flaw in attacks

Security Affairs

The Netlogon service is an Authentication Mechanism used in the Windows Client Authentication Architecture which verifies logon requests, and it registers, authenticates, and locates Domain Controllers. The Zerologon vulnerability, tracked as CVE-2020-1472 , is an elevation of privilege that resides in the Netlogon.

article thumbnail

It's End of Life for ASafaWeb

Troy Hunt

Windows Server has gone from 2008 R2 to 2012 to 2012 R2 to 2016 to 2019. From development and architecture to security. And lastly,NET has gone through a heap of different versions (as has Visual Studio) from 4.x x to Core 1 and now Core 2 (and minor versions within them). From Sydney to the Gold Coast.

article thumbnail

Using a Mythic agent to optimize penetration testing

SecureList

One widely used method for dynamically adding functionality is reflective DLL injection, introduced in 2008. Header contains information about the architecture, timestamp, number of sections and symbols, and other metadata. Its microservice architecture makes it easy to add arbitrary server-side functionality.