Sun.Feb 10, 2019

New Linux coin miner kills competing malware to maximize profits

Security Affairs

Security experts from Trend Micro have discovered a new strain of coin miner that targets the Linux platform and installs the XMR-Stak Cryptonight cryptocurrency miner.

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

WIRED Threat Level

The shutdown may have ended two weeks ago, but federal cybersecurity professionals will be coping with its impact for a long time to come. Security

Thousands of RDM refrigeration systems exposed online are at risk

Security Affairs

Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks.

Risk 93

Court Denies Non-Party’s Request to Quash Subpoena in Telecommunications Dispute: eDiscovery Case Law

eDiscovery Daily

In Fair v. Commc’ns Unlimited Inc., 4:17 CV 2391 RWS (E.D. 16, 2019) , Missouri District Judge Rodney W.

Google open sourced the ClusterFuzz fuzzing platform

Security Affairs

Google has open sourced ClusterFuzz, its fuzzing infrastructure it has developed to find memory corruption vulnerabilities in Chrome. Google has open sourced its fuzzing infrastructure ClusterFuzz that the tech giant developed to find memory corruption bugs in the Chrome browser.

Blog 88

Adiantum will bring encryption on Android devices without cryptographic acceleration

Security Affairs

Google announced Adiantum, a new encryption method devised to protect Android devices without cryptographic acceleration. Google announced Adiantum , a new encryption method devised to protect Android devices without cryptographic acceleration.