article thumbnail

Secure by Design roundup - March 2024

Adam Shostack

Threat Modeling People are raving out our new whitepaper on Inherent Threats! The image is cinematic, dramatic, professional photography, studio lighting, studio background, advertising photography, intricate details, hyper-detailed --v 6.0 --ar 8:3 Blog overview or direct link.) There is a stack of books on the bench.

Software 130
article thumbnail

The evolution of ransomware in 2019: attackers think bigger, go deeper and grow more advanced

Security Affairs

The findings come as highlights of Group-IB whitepaper titled “ Ransomware Uncovered: Attackers’ Latest Methods ,” closely examining the evolution of the ransomware operators’ strategies over the past year, issued today. More recommendations can be found in the relevant section of the whitepaper. . Big Game Hunting. About Group-IB.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cannabis investment scam JuicyFields ends in 9 arrests

Malwarebytes

As we often see with these kinds of changes in regulatory frameworks, cybercriminals are the first to spot a window of opportunity and advertise with investment opportunities, promising a high return on low-risk investments.

Scams 117
article thumbnail

Too much UPnP-enabled connected devices still vulnerable to cyber attacks

Security Affairs

In early 2013, researchers at Rapid7 published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” that evaluated the global exposure of UPnP-enabled network devices. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

article thumbnail

ETERNALSILENCE – 270K+ devices vulnerable to UPnProxy Botnet build using NSA hacking tools

Security Affairs

In early 2013, researchers at Rapid7 published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” that evaluated the global exposure of UPnP-enabled network devices. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

Hacking 111
article thumbnail

MalwareBazaar – welcome to the abuse-ch malware repository

Security Affairs

However, I often get confronted with a simple but severe problem: malware samples referenced in blog posts, whitepaper or mentioned on social media like Twitter are usually not easily available.” “ ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. ” abuse.ch Pierluigi Paganini.

Malware 85
article thumbnail

SpectreRSB – new Spectre CPU side-channel attack using the Return Stack Buffer

Security Affairs

We have already published guidance for developers in the whitepaper, Speculative Execution Side Channel Mitigations. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.