Google is distributing more Meltdown and Spectre Patches for Chrome OS devices

Haythem Elmir

Google announced that mitigations for devices with Intel processors that are affected by the Spectre and Meltdown vulnerabilities will be available for latest stable channel update for Google’s Chrome OS operating system. The Meltdown and Spectre attacks could be exploited by attackers to bypass memory isolation mechanisms and access target sensitive data. The Meltdown attack could allow attackers […]

Q4 2017 Global DDoS Threat Landscape Report

Haythem Elmir

Today we are releasing our latest Global DDoS Threat Landscape Report, a statistical analysis of 5,055 network and application layer DDoS attacks mitigated by Imperva Incapsula services during Q4 2017. In Q4, the number of application layer attacks nearly doubled, just as the number of network layer assaults declined. In both cases, […]

TrickBot Banking Trojan Gets Screenlocker Component

Haythem Elmir

The most recent version of the TrickBot banking trojan now includes a screenlocker component, suggesting the malware’s operators might soon start holding victims for ransom if infected targets don’t appear to be e-banking users. The good news is that the screenlocker mechanism is not fully functional just yet, and appears […]

New R2D2 Technique Protects Files Against Wiper Malware

Haythem Elmir

Purdue University scientists have developed a data protection technique called Reactive Redundancy for Data Destruction (R2D2) that can protect data sitting inside a virtual machine from modern data-wiping malware and even some secure file deletion methods. Researchers say the new technique was successful in preventing wiper malware such as Shamoon (v1 and […]

Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers

Haythem Elmir

Legitimate and large-scale cryptocurrency mining operations often invest in dedicated hardware and electric consumption to make a profit. This doesn’t escape the attention of cybercriminals: Malicious cryptocurrency mining was so pervasive last year that it was the most detected network event in devices connected to home routers. Through our incident response-related monitoring, we observed intrusion attempts […]