You searched for
hacker
https://www.stormshield.com/news/attacking-co-hosted-vm-hacker-hammer-two-memory-modules/
Row-hammer is hardware bug that can cause bit-flips in physical RAM. Mark Seaborn and Thomas Dullien were the first to exploit the DRAM row-hammer bug to gain kernel privileges. Kaveh Razavi pushed the exploitation of row-hammer bugs to the next level. They abused an OS feature - memory de-duplication -...https://www.stormshield.com/news/hackers-really-go-vacation-july/
After a great deal of cyber activity in June there was a lull until the end of July - do hackers take vacations in July too? With the Breach Fighter tool, Stormshield’s Security Intelligence team detects and analyzes malware by examining millions of spams and...https://www.stormshield.com/news/a-short-history-of-open-source/
Free software now plays a critical role across the entire computing world… and thus across the world in general. The issue of how such software is maintained has gradually become a matter of concern, prompting the US Congress to introduce a bill in 2023: the...https://www.stormshield.com/news/cyber-warfare-use-of-cyber-tools-in-the-russian-ukrainian-war/
The Russian invasion of Ukraine marked a first in the history of conflict, with the widespread use of cyberattacks. This development has transformed the landscape of the traditional war, raising many questions. We take a closer look at a hybrid cyber-warfare in which the forces...https://www.stormshield.com/news/security-alert-volt-typhoon-stormshield-response/
A large-scale persistent attack (APT) carried out by the Chinese hacker group Volt Typhoon has just been reported by the US government in conjunction with several private cybersecurity entities. It has targeted critical US infrastructures and appears to have been infiltrated since 2021. Volt...https://www.stormshield.com/news/is-two-factor-authentication-already-a-thing-of-the-past/
Used since the 1980s in the banking sector, the use of two-factor authentication (2FA) has become widespread in recent years to enhance the security of user accounts and their data. It is not uncommon for this authentication method to be targeted by cybercriminals. How can...