![](https://investologics.com/wp-content/uploads/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span-180x180.jpg)
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span
An unknown threat actor with equally unknown motives forces ISP to replace routers. ..
An unknown threat actor with equally unknown motives forces ISP to replace routers. ..
Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach. ..
Exploit code for critical "use-after-free" bug is circulating in the wild. ..
Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels. ..
Among other things, bug allows code running inside a VM to crash hypervisors. ..
No cure yet for a popular iPhone attack, except for turning off Bluetooth. ..
No cure yet for a popular iPhone attack, except for turning off Bluetooth. ..
iLeakage is practical and requires minimal resources. A patch isn't (yet) available. ..
If your company operates in China, it must reveal all hackable bugs to government. ..
Most critical of the bugs allowed attackers to root federated instances. ..