Linus servers are everywhere on the Internet, providing the infrastructure and hosting the Web sites and services we all use. So stealth malware that steals the performance of Linux machines is an issue for admins everywhere. Even though this attack appears to be tailored to specific targets, if you are …
CPU vulnerabilities – and it does not matter if you are team Intel, team AMD or team Apple!
There have been two pieces of recent research that are pointing to serious issues with a lot of the silicon we use to power our computers. Some of which may be irreparable. The Apple M1 attack is called PACMAN, as it exploits the Pointer Authentication Code (PAC). This attack bypasses …
Distributed Denial of Service attacks
The denial-of-service (DoS) attack, is a common attack used by those who want to make a point or make money, by disrupting the availability of websites and web services. In simple terms the threat actor finds a way to flood a system with malicious network traffic to overload network infrastructure …
How the threat actors can get ransomware onto your systems
Before any malware can carry out the malicious tasks it was designed to do – it has to get into and infect a host system. This can be done in a variety of ways. It can be something as simple as plugging in an infected USB stick into your computer …
Continue reading “How the threat actors can get ransomware onto your systems”
The world is a better place with less social engineering scams
Here is a good news story: A two month operation – called First Light 2022 – between law enforcement agencies of 76 nations has led to the seizure of millions of pounds of assets and the arrest of thousands. The organised gangs targeted were behind hundreds of telecommunications and social …
Continue reading “The world is a better place with less social engineering scams”
