Please turn on your JavaScript for this page to function normally.
Kubernetes
So, you want to deploy air-gapped Kubernetes, huh?

So, you want to deploy Kubernetes in an air-gapped environment, but after months of grueling work, you’re still not up and running. Or maybe you’re just embarking on the …

wallet
Exfiltrating private keys from air-gapped cold wallets

Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security …

cables
Researchers use power lines to exfiltrate data from air-gapped computers

Researchers from the Ben-Gurion University of the Negev have come up with another way to exfiltrate data from air-gapped computers: this time, it’s via malware that can …

camera
Using security cameras and infrared light to extract data from air-gapped networks

Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light …

CIA
How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via …

USB
USBee makes USB devices transmit data from air-gapped computers

After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at …

eye
Top-level cyber espionage group uncovered after years of stealthy attacks

Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile …

rings
Exfiltrating data from air-gapped computers by modulating fan speed

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, …

Broken glass
Asian company is the newest APT threat

An unnamed South Asian software development consultancy that creates software for employee monitoring is also an APT player and, according to CloudSek CTO Rahul Sasi, it …

Truth
Exposed: New toolset of the Sofacy cyber-espionage group

Kaspersky Lab has spotted new attacks by the Sofacy group which make use of several upgraded techniques designed for aggressive persistency and greater invisibility of …

Nuclear facilities are wide open to cyber attacks

You would think that, given the potential disastrous consequences of a successful hack, the computer systems and networks of nuclear facilities would be better secured agains …

How to protect from threats against USB enabled devices

Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even …

Don't miss

Cybersecurity news