Skip to content (Press Enter)
  • Personal
    • Secure Hunter FREE
    • Secure Hunter PRO
    • Secure Hunter Beta
    • Secure Hunter Error Code
    • More Free Tools
      • Secure Hunter Anti-Theft Android App
      • Secure Hunter NetstatWrapper
  • Secure Hunter Business
    • Small Business
    • Secure External Removal
    • Webmaster Tool Kit
  • Support
    • Knowledge Base
    • Community
    • Secure Hunter F.A.Q.
    • Cyber Security Glossary
    • Consulting
    • Partners
  • Affiliates
    • Secure Hunter Resellers
  • Company
    • About Us
    • Career Opportunities
    • Testimonials
    • Contact
    • Sitemap
  • Blog
Secure Hunter Free Anti Malware Software

Secure Hunter Anti-Malware

Secure your data and hunt dangerous threats

  • Personal
    • Secure Hunter FREE
    • Secure Hunter PRO
    • Secure Hunter Beta
    • Secure Hunter Error Code
    • More Free Tools
      • Secure Hunter Anti-Theft Android App
      • Secure Hunter NetstatWrapper
  • Secure Hunter Business
    • Small Business
    • Secure External Removal
    • Webmaster Tool Kit
  • Support
    • Knowledge Base
    • Community
    • Secure Hunter F.A.Q.
    • Cyber Security Glossary
    • Consulting
    • Partners
  • Affiliates
    • Secure Hunter Resellers
  • Company
    • About Us
    • Career Opportunities
    • Testimonials
    • Contact
    • Sitemap
  • Blog
Home>Secure Hunter Blog>Anti-Malware News>ETHERLED: Air-gapped systems leak data via network card LEDs
August 23, 2022August 23, 2022/ james

ETHERLED: Air-gapped systems leak data via network card LEDs

Anti-Malware News

Israeli researcher Mordechai Guri has discovered a new method to exfiltrate data from air-gapped systems using the LED indicators on network cards. Dubbed ‘ETHERLED’, the method turns the blinking lights into Morse code signals that can be decoded by an attacker. […]

Post Navigation

Prev PostGoogle: Iranian hackers use new tool to steal email from victims
Next PostNew ‘Donut Leaks’ extortion gang linked to recent ransomware attacks

You may also like...

GitHub now auto-blocks token and API key leaks for all repos

GitHub now auto-blocks token and API key leaks for all repos

GitHub revokes duplicate SSH auth keys linked to library bug

GitHub revokes duplicate SSH auth keys linked to library bug

The Week in Ransomware – June 24th 2022 – Splinter Cells

The Week in Ransomware – June 24th 2022 – Splinter Cells

Bouncy Castle fixes cryptography API authentication bypass flaw

Bouncy Castle fixes cryptography API authentication bypass flaw

Popular Posts

Best free antispyware

Best free antispyware

Clop ransomware likely testing MOVEit zero-day since 2021

Clop ransomware likely testing MOVEit zero-day since 2021

Cloud Topology- sense of alluring

Cloud Topology- sense of alluring

How to Find the Best Malware Removal Tool?

How to Find the Best Malware Removal Tool?

PRESS

fox news CBS news

Latest News

  • Clop ransomware likely testing MOVEit zero-day since 2021
  • Clop ransomware likely exploiting MOVEit zero-day since 2021
  • Vivaldi is spoofing Edge Browser to bypass Bing Chat restrictions

AWARDS

Copyright © 2023 Secure Hunter Anti-Malware. Software Company | Developed By Rara Theme. Powered by WordPress.