Please turn on your JavaScript for this page to function normally.
signal
Ubiquiti routers hit by backdoor-generating worm

A worm targeting wireless network equipment developed by US-based Ubiquiti Networks has already managed to compromise thousands of routers across the world. To spread it, …

Tor project
Tor Project exploring ways to keep its software and users safe

In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …

criminal
Carbanak cyber-thieves’ newest attacks exposed

The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …

WordPress
Popular WordPress plugin opens backdoor, steals user credentials

If you are one of the 10,000+ users of the Custom Content Type Manager (CCTM) WordPress plugin, consider your site to be compromised and proceed to clean your installation up, …

backdoor
Most infosec pros consider government-mandated encryption backdoors a bad idea

Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …

Linux Mint
Linux Mint hack: Backdoored ISOs, stolen forums database

The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …

Government-mandated crypto backdoors are pointless, says report

If you needed another confirmation that government-mandated backdoors in US encryption products would only serve to damage US companies’ competitiveness without actually …

Skype
T9000 backdoor steals documents, records Skype conversations, victims’ actions

A new backdoor Trojan with spyware capabilities is being used in targeted attacks against organizations based in the United States. It has been dubbed T9000, since it’s …

backdoor
Year-old crypto flaw in Socat created a potentially intentional backdoor

A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …

linux tux
Versatile Linux backdoor acts as downloader, spyware

Another Linux Trojan has been discovered by researchers, and this one is pretty versatile: it opens a backdoor into the infected device, can download and run additional …

Fortinet
SSH backdoor found in more Fortinet devices, exploit attempts spotted in the wild

In case you missed it, Fortinet announced last week that the recently discovered FortiOS SSH backdoor – or, as they call it, “a management authentication …

labyrinth
“Deliberately hidden” backdoor found on US government’s comms system

Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …

Don't miss

Cybersecurity news