https://www.stormshield.com/news/industrial-cybersecurity-strategic-project-must-not-underestimated/
As traditional industrial systems and Operational Technology (OT) become more connected, cyber threats unique to this sector represent a significant danger for the industry. There are plenty of examples to highlight the serious vulnerability of many players: energy, transport, etc. In this context, cyberterrorism can...https://www.stormshield.com/news/attacking-co-hosted-vm-hacker-hammer-two-memory-modules/
Row-hammer is hardware bug that can cause bit-flips in physical RAM. Mark Seaborn and Thomas Dullien were the first to exploit the DRAM row-hammer bug to gain kernel privileges. Kaveh Razavi pushed the exploitation of row-hammer bugs to the next level. They abused an OS feature - memory de-duplication -...https://www.stormshield.com/news/atms-preferred-target-cyber-attacks/
In a report published earlier this week, Europol’s European Cybercrime Centre (the European cyberpolice office) takes a look at how cyber attacks against ATMs have been evolving. And the crucial importance of implementing more effective protection. Cashing in on ATM malware This report, which...https://www.stormshield.com/news/analyzing-form-grabber-malware-targeting-browsers/
As a new member of the Stormshield Security Intelligence team, my initiation ritual was to analyze a form-grabber malware used to steal passwords thanks to web-browser injection method. In this article I'll try to present a detailed analysis of this malware, with emphasis on the...