Thin Client Customization

The Raspberry Pi is a single computer board, developed for Internet of Things (IoT) projects. The low cost, numerous connectivity options, and 'plug and play' nature of Pi makes for a board that is ideal for all. Pi is the perfect tool; you can use it as a desktop computer, media center, server, monitoring/security device, or any other custom application. We can compile any Linux-based Operating System (OS) to run on the versatile Raspberry Pi. Unlock the potential of the Raspberry Pi with plenty of access to development software and configuration options.

Critical Windows Zero-Day Flaw Warning

The flaw exists because the Windows version of Adobe Type Manager Library improperly handles a specially-crafted multi-master font (called the Adobe Type 1 PostScript format). Type 1 vector outline fonts are a specialized form of PostScript, which contain instructions for building outlines from scaleable lines and curves ...

Apple Fixes Critical WebKit Flaws in iOS, Safari

The most severe of the vulnerabilities is a type confusion bug, CVE-2020-3897, in WebKit. Type confusion flaws are caused because a piece of code doesn't verify the type of object that is passed to it, and uses it blindly without type checking. The flaw could be abused by a remote hacker but user interaction is required to exploit the vulnerability. The vulnerability allows remote hackers to execute arbitrary code on affected installations of Apple Safari ...

APT36 uses Coronavirus to Spread Crimson RAT

Previous APT36 campaigns mainly relied on spear phishing and watering hole attacks to gain its foothold on victims. This most recent phishing email attaches a malicious macro document that targets vulnerabilities in RTF files. This is a high-severity Microsoft vulnerability, which allows hackers to execute Visual Basic script when a user opens a malicious Microsoft Office RTF document. ...

Corona virus Themed Attack Spreads Malware

After the victim opens the specially crafted RTF document, and the Microsoft Word vulnerability is exploited, a malicious file,intel.wll, is dropped into the Microsoft Word startup folder ( %APPDATA%MicrosoftWordSTARTUP ). This serves to persist the malware and prevents the infection from fully activating if run inside a sandbox since a relaunch of Microsoft Word is required for the full execution of the malware. The file, intel.wll, then downloads a DLL file, which serves as the loader for th ...