The targets were scanned millions of times, and are all in some way linked to China’s ongoing economic development activities, according to Recorded Future.
The program focuses on potential abuse methods across Google’s product-specific channels like Google+, Youtube, Gmail and Blogger.
Misconfigured DIY smart-home hubs for home automation could allow attackers to track owners’ movements, see if smart doors and windows are opened or closed, and even open garage doors.
Advanced behavior malware threats are targeting telecom services – at a higher level than the global average, researchers found.
The method could be used to deduce the age, sex, likes or the location history of a user – essentially, the attacker can play “20 questions” to profile the victim.
The tricky Cortana flaw, CVE-2018-8253, was addressed by Microsoft during Patch Tuesday.
In testing, an Internet of Things (IoT) botnet of large, power-consuming appliances was used to carry out coordinated attacks on the energy grid.
Researchers say the “PhishPoint” tactic has already impacted 10 percent of Office 365 users globally.
In addition to traditional phishing, fraudulent cryptocurrency offers pose a rising trend.
VU#982149: Intel processors are vulnerable to level 1 terminal fault (L1TF) cache information disclosure via speculative execution side channel
Vulnerability Note VU#982149 Intel processors are vulnerable to level 1 terminal fault (L1TF) cache information disclosure via speculative execution side channel Original Release date: 15 Aug 2018 | Last revised: 15 Aug 2018 Overview Multiple Intel processors may be vulnerable to one or more L1 data cache information disclosure and terminal fault attacks via a