China-based Hackers Attack Linux with REDXOR Malware

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Chinese Hackers Attack Linux with REDXOR Malware

On Wednesday, March 10, 2021, Intezer Researchers revealed a new malware targeting Linux endpoints and servers. Researchers dubbed this “undocumented backdoor” as REDXOR for its “network data encoding scheme based on XOR.” Researchers believe REDXOR was developed by sophisticated Chinese bad actors. The malware was uploaded from Taiwan and Indonesia. Furthermore, through their investigation, Intezer … Read more

Problems With Anti-Virus Software and Alternative Solutions

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Anti-Virus Software, Hand holding magnifying glass to computer, virus detected

Anti-Virus software is the layman’s solution to cybersecurity. Functioning as a first line of defense, Anti-Virus software works to prevent, detect, and remove malware from your computer. However, Anti-Virus software is not a cure all solution. In fact, IMB Knowledge Center published a piece on the limitations of Anti-Virus protection. In the article, they cite … Read more

From the Fall 2016 Issue

Cybersecurity for Wireless Devices and Networks

Author(s):

Philip Green, President/CEO, INNOPLEX, LLC

In the cybersecurity environment, the role a cyber-attacker plays in a given scenario is much easier to execute than that of a defender. This assertion is a basic tenet of cybersecurity operations that most security professionals around the world acknowledge. In general terms, an attacker needs to find only one weakness or intrusion opportunity, while … Read more

From the Fall 2016 Issue

Signals and Noise: Examining Flaws in SS7

Author(s):

Connie Uthoff, Program Director, The George Washington University

In mid-August of 2016, a hacker referred to as “Guccifer 2.0” allegedly released documents stolen from the Democratic Congressional Campaign Committee (DCCC), including the personal cell phone numbers and email addresses of nearly all Democrats in the House of Representatives. The same hacker claimed credit for the recent Democratic National Committee (DNC) hacks; which resulted … Read more

From the Fall 2016 Issue

Incentivize Me: The Story of IoT & Malware

Author(s):

Craig Harper, Chief Technology Officer, Sysorex

Wow-factor. It’s one of the best parts of new technology. Childhood dreams and impossible ideas have not only come to exist, but are highly integrated into our daily lives. The Internet of Things (IoT) phenomenon has the wow-factor that so many seek and try to harness in their ideas and products. But those who are … Read more