In-brief: IBM researchers say they have seen a spike in malicious activity linked to the Dyre family of malware. Sophisticated attacks on business banking accounts have led to the theft of millions of dollars, IBM says.
published research
Drug Pumps Vulnerable to trivial Hacks, DHS warns
In-brief: The Department of Homeland Security warned that drug infusion pump management software sold by Hospira contains serious and exploitable vulnerabilities that could be used to remotely take control of the devices.
Petulant Penguin Attacks Use Antarctica As Base
In-brief: A new sophisticated cyber crime campaign dubbed “Petulant Penguin” by one research firm appears to use compromised computers at Antarctic research bases to launch targeted attacks on government agencies in the U.S. and Europe.
Supply Chain Hackers Use Short List of Techniques | Trend Micro
In-brief: Trend Micro notes that supply chain attacks are on the rise, with attackers relying on a short list of techniques including compromises of source code, firmware and so-called “watering hole” attacks.
Is Google’s Rowhammer the Future of IoT Attacks?
In-brief: Infoworld’s Roger Grimes makes the case that Google’s recent Rowhammer exploit may be a sign of things to come as attackers look for common platforms to attack the Internet of Things.