Sat.Aug 13, 2022

article thumbnail

Updated Android Trojan Features Ransomware Capabilities

Data Breach Today

Trojan Targets More Than 200 Mobile Banking Applications An updated version of the Russian-linked SOVA Android Trojan is back with updated attack techniques targeting more than 200 mobile applications, including banking apps and crypto exchanges/wallets. Researchers at Cleafy uncovered that the Trojan now also features ransomware capabilities.

article thumbnail

Three flaws allow attackers to bypass UEFI Secure Boot feature

Security Affairs

Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature. Researchers from hardware security firm Eclypsium have discovered a vulnerability in three signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that can be exploited to bypass the UEFI Secure Boot feature.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Flaw in the VA Medical Records Platform May Put Patients at Risk

WIRED Threat Level

The Veterans Affairs' VistA software has a vulnerability that could let an attacker "masquerade as a doctor," a security researcher warns.

Risk 97
article thumbnail

Killnet claims to have breached Lockheed Martin

Security Affairs

Russian hacker group Killnet claims to have launched a DDoS attack on the aerospace and defense giant Lockheed Martin. . The Moscow Times first reported that the Pro-Russia hacker group Killnet is claiming responsibility for a recent DDoS attack that hit the aerospace and defense giant Lockheed Martin. The Killnet group also claims to have stolen data from a Lockheed Martin employee and threatened to share it.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A New Tractor Jailbreak Rides the Right-to-Repair Wave

WIRED Threat Level

A hacker has formulated an exploit that provides root access to two popular models of the company's farm equipment.

Access 99
article thumbnail

The Feds Gear Up for a Privacy Crackdown

WIRED Threat Level

Plus: Cisco gets hit by ransomware, Twilio gets phished, a new way to fight email spammers, and much more.

Privacy 95