Recorded Future

Asus ShadowHammer suggests Supply Chain Hacks are the New Normal

The compromise of device maker Asus Live Update Utility is just the latest evidence that sophisticated attackers have software supply chains in the crosshairs.

Internet Explorer

Report: with most exploited vuln of 2018, it’s really Really REALLY time to ditch IE!

Microsoft’s products are still a leading source of exploitable security vulnerabilities used by hackers, according to a report by the firm Recorded Future.

China's Ministry of State Security

China caught pushing Vulnerability Reporting Delays down the Memory Hole

China is attempting to cover up inexplicable delays in public reporting of high-risk software security holes by changing the dates of vulnerability-publication to its national vulnerability database so they match those in the U.S. database, according to new research by Recorded Future.

China delays notification of software holes targeted in state hacks

China is doing a better job finding and disclosing information on software security holes…except when those vulnerabilities are high risk and might be used in targeted attacks. That, according to a report out Thursday by the firm Recorded Future.

THAAD Missile System

Exclusive: Eye on Weapons Systems, North Korean Hackers target US Defense Contractors

North Korean hackers have stepped up their attacks on U.S. defense contractors in an apparent effort to gain intelligence on weapon systems and other assets that might be used against the country in an armed conflict with the United States and its allies, The Security Ledger has learned.