A busy year ahead in low-code and no-code development

Will 2022 be the year the year citizen developers finally take the reigns leading application development across their respective lines of business? It looks likely, thanks to emerging low-code, no-code and serverless solutions. And, importantly, there will also be another “citizen” in the mix — professional developers themselves, rapidly accelerating their abilities to plan, assemble […]

Read More

Log4j: How hackers are using the flaw to deliver this new ‘modular’ backdoor

Iran-backed hacking group Phosphorous or APT35 is using the Log4j vulnerability to distribute a new modular PowerShell toolkit, according to security firm Check Point.  APT35 is one of several state-backed hacking groups known to have been developing tools to exploit public-facing Java applications that use vulnerable versions of the Log4j error-logging component. Microsoft, which tracks […]

Read More

KCodes NetUSB kernel remote code execution flaw impacts millions of devices

A high-impact vulnerability allowing remote code execution to take place has impacted millions of end-user router devices.  On Tuesday, SentinelOne published an analysis of the bug, tracked as CVE-2021-45388 and deemed critical by the research team.  The vulnerability impacts the KCodes NetUSB kernel module. KCodes solutions are licensed by numerous hardware vendors to provide USB […]

Read More

NoReboot attack fakes iOS phone shutdown to spy on you

A new technique that fakes iPhone shutdowns to perform surveillance has been published by researchers.  Dubbed “NoReboot,” ZecOps’ proof-of-concept (PoC) attack is described as a persistence method that can circumvent the normal practice of restarting a device to clear malicious activity from memory.  Making its debut with an analysis and a public GitHub repository this […]

Read More