Advertisement

backdoors

In a post published Wednesday, watchTowr Labs CEO Benjamin Harris and researcher Aliz Hammond said they have successfully identified entry points into thousands of live backdoors being used by hackers through the interconnected infrastructure they leave behind. (Image Source: Getty Images)

Malicious hackers have their own shadow IT problem

Researchers at watchTowr Labs found that abandoned and expired internet infrastructure left by hacking groups can function as backdoors within other backdoors.
Mourners pay tributes at a makeshift memorial for the victims of the deadly Halloween crowd surge, outside a subway station in the district of Itaewon in Seoul on November 1, 2022. (Photo by JUNG YEON-JE/AFP via Getty Images)

North Korean hackers exploit Itaewon tragedy to infiltrate South Korean targets

The notorious hacking group used the Halloween tragedy that killed more than 150 people to trick South Koreans into downloading malware.
Paul Nakasone
Gen. Paul Nakasone, Cyber Command’s commander, at a Senate Armed Services Committee hearing on March 25, 2021. (Photo by Andrew Harnik-Pool/Getty Images)

US report details SolarWinds hacking tools

“Reduced exposure to malicious activity” for U.S. organizations is the goal.
Advertisement
Advertisement
Advertisement