Below, you will find the HPE Security Researchkey articles of interest for February 19, 2016. These are publically available articles that are provided as a news service only. The intent of this blog post is to share current events related to the cyber security industry.
In recent years, air-gapped computers, which are disconnected from the internet so hackers can not remotely access their contents, have become a regular target for security researchers. Now, researchers from Tel Aviv University and Technion have gone a step further than past efforts, and found a way to steal data from air-gapped machines while their equipment is in another room.
During our research, using non-invasive methods, we were able to acquire the Locky index,php file along with some additional files, One of the other files we were able to capture for analysis was the administrative panel code, admin.php.
As cybercriminals increasingly monetize their malware efforts, enterprise defenders need to recognize that the application layer has become the biggest battlefield in today's IT risk management model. So says the HPE Cyber Risk Report 2016, released today by Hewlett Packard Enterprise (HPE) today, which highlights a number of key statistics in last year's attack patterns.