attack

Companies attack Texas over ‘politicised’ ESG blacklist

Companies attack Texas over ‘politicised’ ESG blacklist

Financial groups included on a blacklist of companies that Texas considers hostile to fossil fuels have attacked the process as politicised and arbitrary. Texas comptroller Glenn Hegar is implementing a 2021 law that requires state pension and school funds to divest shares they hold in listed financial groups which, in the government’s view, “boycott energy …

Companies attack Texas over ‘politicised’ ESG blacklist Read More »

MEMS Gyroscope Ultrasonic Covert Channel

New Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak Data

A novel data exfiltration technique has been found to leverage a covert ultrasonic channel to leak sensitive information from isolated, air-gapped computers to a nearby smartphone that doesn’t even require a microphone to pick up the sound waves. Dubbed GAIROSCOPE, the adversarial model is the latest addition to a long list of acoustic, electromagnetic, optical, …

New Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak Data Read More »

Ethereum is under attack as U.S. sanctions apply at a protocol level

Ethereum is under attack as U.S. sanctions apply at a protocol level

The hope of a decentralized, open, free internet is in jeopardy right now. This is not hyperbole, FUD, or clickbait. Ethermine, the largest Ethereum mining pool, no longer produces blocks containing Tornado Cash transactions. This is likely due to OFAC sanctions and is an example of censorship at the protocol level. Crypto analyst, Takens Theorem, …

Ethereum is under attack as U.S. sanctions apply at a protocol level Read More »

Another crypto bridge attack: Nomad loses $190 million in 'chaotic' hack | CNN Business

Another crypto bridge attack: Nomad loses $190 million in ‘chaotic’ hack | CNN Business

New York CNN Business  —  Heists continue to plague the crypto world, with news of large sums stolen from digital currency firms seemingly every month. But while crypto exchanges were once the main point of attack, hackers now appear to have a new target: blockchain bridges. Bridges are the infrastructure that allow users to exchange …

Another crypto bridge attack: Nomad loses $190 million in ‘chaotic’ hack | CNN Business Read More »

Hacker typing on a keyboard

Chinese hackers use new Cobalt Strike-like attack framework

Researchers have observed a new post-exploitation attack framework used in the wild, named Manjusaka, which can be deployed as an alternative to the widely abused Cobalt Strike toolset or parallel to it for redundancy. Manjusaka uses implants written in the cross-platform Rust programming language, while its binaries are written in the equally versatile GoLang. Its …

Chinese hackers use new Cobalt Strike-like attack framework Read More »

The Wall Street Journal says Elon Musk's online attacks against Investigations Editor Michael Siconolfi are 'unwarranted and unfounded.' Musk is pictured in January 2019

WSJ defends editor under attack from Elon Musk over allegation of affair with Sergey Brin’s ex-wife

The Wall Street Journal says Elon Musk’s online attacks against Investigations Editor Michael Siconolfi are ‘unwarranted and unfounded after the paper claimed Musk had an affair with the then-wife of Google’s co-founder.  A Wall Street Journal spokesman told DailyMail.com that they were ‘confident in our sourcing and stand by our reporting.’ WSJ also noted Siconolfi was …

WSJ defends editor under attack from Elon Musk over allegation of affair with Sergey Brin’s ex-wife Read More »

Microsoft closes off two avenues of attack on its software

Microsoft closes off two avenues of attack on its software

Microsoft is trying to shut the door on a couple of routes cybercriminals have used to attack users and networks. The enterprise IT giant’s policy of blocking Visual Basic for Applications (VBA) macros in downloaded Office documents by default has been activated once again after a brief pause to address feedback from users who were …

Microsoft closes off two avenues of attack on its software Read More »

A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys

New working speculative execution attack sends Intel and AMD scrambling

Some microprocessors from Intel and AMD are vulnerable to a newly discovered speculative execution attack that can covertly leak password data and other sensitive material, sending both chipmakers scrambling once again to contain what is proving to be a stubbornly persistent vulnerability. Researchers from ETH Zurich have named their attack Retbleed because it exploits a …

New working speculative execution attack sends Intel and AMD scrambling Read More »

I sent my yoga studio a web form, and all I got was this lousy malware attack

I sent my yoga studio a web form, and all I got was this lousy malware attack

Getty Images On the last day of May, one of my inboxes began receiving emails, purportedly from one of the owners of the yoga studio I visit. It concerned a message I sent in January through the studio’s website that had been resolved the following day in an email sent by the co-owner. Now, here …

I sent my yoga studio a web form, and all I got was this lousy malware attack Read More »

PS3: LV0 Man-in-the-middle attack writeup + tools, by MikeM64. Full CFW for all PS3s is next? - Wololo.net

PS3: LV0 Man-in-the-middle attack writeup + tools, by MikeM64. Full CFW for all PS3s is next? – Wololo.net

PS3 Developer MikeM64 has published a full description of his hardware MITM attack on the PS3, following pictures of the attack revealed a few weeks ago. The aim of this exploit is to fully unlock the LV0 (Boot Loader) on PS3 newer models, to ultimately be able to install Full Custom Firmwares on the console. …

PS3: LV0 Man-in-the-middle attack writeup + tools, by MikeM64. Full CFW for all PS3s is next? – Wololo.net Read More »