article thumbnail

CSO: Gigabyte firmware component can be abused as a backdoor

Security Boulevard

Attackers can abuse the UEFI firmware to inject executable malware code into the Windows kernel, compromising systems. Read More > The post CSO: Gigabyte firmware component can be abused as a backdoor appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

CSO 52
article thumbnail

The Week in Security: Former Uber CSO convicted over hack cover-up, supply chain attack targets media

Security Boulevard

This week: Former Uber CSO is convicted for his attempted cover-up of a 2016 hack of the company. Also: A software supply chain attack has pushed out malware to at least 250 media sites. .

CSO 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wave of native IIS malware hits Windows servers

CSO Magazine

Security researchers warn that multiple groups are compromising Windows web servers and are deploying malware programs that are designed to function as extensions for Internet Information Services (IIS). How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters !

Malware 135
article thumbnail

Gootkit malware creators expand their distribution platform

CSO Magazine

The cybercriminal gang behind the Gootkit Trojan is expanding its malware distribution activities and is improving its multi-stage distribution platform to deliver additional threats. How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! Sign up for CSO newsletters ! ].

Malware 117
article thumbnail

Siloscape malware escapes Windows containers to backdoor Kubernetes clusters

CSO Magazine

Malware attacks against cloud containers are nothing new, but these attacks have primarily focused on Linux deployments because they are the most common and where containers were born. How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! Sign up for CSO newsletters ! ]

Malware 98
article thumbnail

APT group hits IIS web servers with deserialization flaws and memory-resident malware

CSO Magazine

A sophisticated, likely government-sponsored threat actor has been compromising major public and private organizations over the past year by exploiting deserialization flaws in public-facing ASP.NET applications to deploy fileless malware. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].

Malware 145
article thumbnail

4 most dangerous emerging ransomware threat groups to watch

CSO Magazine

Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters. ] These are AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0. To read this article in full, please click here