Apple's M1 chip has a vulnerability that can't be fixed without a silicon revision, according to developer Hector Martin. The flaw allows for covert channels that enable two malicious apps to talk to ...
Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored. The latest example ...
A new data exfiltration technique has been discovered, which uses a covert ultrasonic channel to leak sensitive information from air-gapped computers to a nearby smartphone device. The adversarial ...
A security researcher has developed a tool to demonstrate how the unauthenticated data packets in the 802.11 wireless LAN protocol can be used as a covert channel to control malware on an infected ...
Researchers at Fidelis have found a covert channel that malware can import and export data through the Transport Layer Security (TLS) protocol. This new channel works from industry standard X.509 ...
A new malware dubbed 'WogRAT' targets both Windows and Linux in attacks abusing an online notepad platform named 'aNotepad' as a covert channel for storing and retrieving malicious code. According to ...