article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

The threat of bad actors hacking into airplane systems mid-flight has become a major concern for airlines and operators worldwide. Back in 2015, a security researcher decided to make that very point when he claimed to have hacked a plane , accessed the thrust system, and made it fly higher than intended.

Software 264
article thumbnail

Lazarus Group North Korea strikes South Korean software firm

CyberSecurity Insiders

Lazarus hacking group aka APT group from North Korea has hit the news headlines for launching a supply chain attack on a software company operating in lines with US Technology firms SolarWinds and Kaseya firms. MATA is a malicious software framework that can infect machines operating on Windows, Linux and MacOS OSes.

Software 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

Furman for crimes of espionage, computer hacking, contempt of Court, making false statements to the FBI, and child pornography.” ” In July 2022, Schulte was found guilty in a New York federal court of stealing the agency’s hacking tools and leaking them to WikiLeaks in 2017. . District Judge Jesse M.

article thumbnail

The OpenSSL Project addressed three vulnerabilities

Security Affairs

In 2010, the Open SSL project addressed three vulnerabilities, including two DDoS issues rated high severity. SecurityAffairs – hacking, encryption). The issue affects servers using OpenSSL 1.0.2 which are vulnerable to SSL version rollback attacks. Pierluigi Paganini.

DDOS 100
article thumbnail

China-linked Budworm APT returns to target a US entity

Security Affairs

The China-linked APT27 group has been active since 2010, it targeted organizations worldwide, including U.S. It is designed to load malicious DLLs and encrypt payloads.” SecurityAffairs – hacking, Budworm APT). This is the first time that Symantec researchers have observed the Budworm group targeting a U.S-based

article thumbnail

Experts linked ransomware attacks to China-linked APT27

Security Affairs

The APT group has been active since 2010, targeted organizations worldwide, including U.S. The hackers used the Windows drive encryption tool BitLocker to lock the servers. “Earlier this year, Security Joes and Profero responded to an incident involving ransomware and the encryption of several core servers.

article thumbnail

Dragon Breath APT uses double-dip DLL sideloading strategy

Security Affairs

The attack consists of a clean application, which acts as a malicious loader, and an encrypted payload. “DLL sideloading, first identified in Windows products in 2010 but prevalent across multiple platforms, continues to be an effective and appealing tactic for threat actors.” ” concludes the post.

Malware 85