A busy year ahead in low-code and no-code development

[ad_1] Will 2022 be the year the year citizen developers finally take the reigns leading application development across their respective lines of business? It looks likely, thanks to emerging low-code, no-code and serverless solutions. And, importantly, there will also be another “citizen” in the mix — professional developers themselves, rapidly accelerating their abilities to plan, […]

Read More

Log4j: How hackers are using the flaw to deliver this new ‘modular’ backdoor

[ad_1] Iran-backed hacking group Phosphorous or APT35 is using the Log4j vulnerability to distribute a new modular PowerShell toolkit, according to security firm Check Point.  APT35 is one of several state-backed hacking groups known to have been developing tools to exploit public-facing Java applications that use vulnerable versions of the Log4j error-logging component. Microsoft, which […]

Read More

KCodes NetUSB kernel remote code execution flaw impacts millions of devices

[ad_1] A high-impact vulnerability allowing remote code execution to take place has impacted millions of end-user router devices.  On Tuesday, SentinelOne published an analysis of the bug, tracked as CVE-2021-45388 and deemed critical by the research team.  The vulnerability impacts the KCodes NetUSB kernel module. KCodes solutions are licensed by numerous hardware vendors to provide […]

Read More

NoReboot attack fakes iOS phone shutdown to spy on you

[ad_1] A new technique that fakes iPhone shutdowns to perform surveillance has been published by researchers.  Dubbed “NoReboot,” ZecOps’ proof-of-concept (PoC) attack is described as a persistence method that can circumvent the normal practice of restarting a device to clear malicious activity from memory.  Making its debut with an analysis and a public GitHub repository […]

Read More