May Device Threat Report – Security Boulevard

0
296
Security

Part two of Eclypsium’s series on best practices for firmware updates focuses on the tools and techniques used by the enterprise IT teams tasked with implementing update processes. This paper provides a high-level comparison across multiple vendors and technologies to help IT and security teams understand the differences between some of the tools and techniques being used today. READ >

Computer security

DEVICE & FIRMWARE THREATS IN THE WILD

  •  Chinese Hacking Group “APT41” Is Using a New Speculoos Backdoor — APT41 has exploited, yet again, CVE-2019-19781. This time APT41 uses a new malware backdoor, Speculoos, to laterally move in corporate networks as the group targets devices that have access to a large number of systems. Speculoos also enables APT41 to modify network traffic, which then opens the door to the possibility of additional payload injection or man-in-the-middle attacks. This malware is hard to detect on Citrix appliances, and it will persist. These devices most likely aren’t inspected regularly or at all. Organizations with a complete hardware inventory can proactively identify and protect devices from threats hidden within.
  • There’s Now COVID-19 Malware That Will Wipe…

Read More…

Актуальные книги на английском