Code of destruction – malware analysis
We should always think twice before running an unknown program downloaded from the Internet. Of course not every application is dangerous, but it’s all too easy to find a maliciousRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
We should always think twice before running an unknown program downloaded from the Internet. Of course not every application is dangerous, but it’s all too easy to find a maliciousRead More →
Nintendo’s new location-based augmented reality game ‘Pokémon GO’ is hot right now. Like really, really popular—so much so that players are spoofing their phone’s location using VPNs in their questRead More →
Decrypter works with older Jigsaw versions as well. Security researchers from Check Point announced over the weekend that they identified a way to decrypt files locked by the Jigsaw ransomware, bothRead More →
Email address found used for registering C&C domain names for Lurk, Angler, and Necurs infrastructure. As many infosec professionals have initially suspected, there is a connection between the arrests madeRead More →
Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate. Ghost Squad Hackers (GSH), a hacktivist group madeRead More →
Almost 1.7 million users affected by latest breaches. A hacker who goes by the name of uid0 claims to have breached three websites belonging to Penton Technology: Hot Scripts, Mac Forums,Read More →
Learn Ethical Hacking Course Online Through These 10 YouTube Channels. There has been an increasing demand for ethical hackers (also known as white hat hackers or penetration testers) in the lastRead More →
Some attacks are hard to spot even by human subjects. A series of distorted voice commands surreptitiously hidden in YouTube videos can force unprotected Android or iOS smartphones to carry outRead More →
We put people first in everything we do at Messenger, and today we are beginning to roll out a new option within Messenger to better support conversations about sensitive topics.Read More →
A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack. Once again IoT devices are affected by a serious flawRead More →
The number of locations affected rocketed by more than three-fold. Restaurant chain Wendy’s said that the number of restaurants affected by a credit card hack has more than tripled since itsRead More →
A new version of the CryptXXX Ransomware was discovered by Brad Duncan that includes changes to encrypted file names, uses modified ransom note names, a new template, and a new TOR paymentRead More →
Blind SQL injection vectors are considered either partial-blind or full-blind in terms of feedback provided to the attacker. Often SQL injection vulnerabilities will be blind when the web application isRead More →
Review your cronjobs for rogue wget downloads. On June 9, the GNU wget project released version 1.18 of its famous file downloading package, following a report from security researcher Dawid GolunskiRead More →
For a few days, I’m seeing a lot of phishing emails that try to steal credentials from victims. Well, nothing brand new but, this time, the scenario is quite different :Read More →
Facebook is clearly very serious about its mission to connect the world and in the process, it has launched solar-powered drones that use lasers to connect to each other and theRead More →
Security researcher BloodDolly recently discovered a new file encrypter called Alfa Ransomware, or Alpha Ransomware, which is from the developers of Cerber. As BloodDolly is still currently analyzing this ransomware,Read More →
The domain name’s new owners want $2.5 million to give it back. In common with many other vendors, TP-Link, one of the world’s biggest sellers of Wi-Fi access points and homeRead More →
ESET analyzes multiple samples targeting OS X every day. Those samples are usually potentially unwanted applications that inject advertisements into browser displays while the victim is browsing the web. For theRead More →
The upcoming version of Android introduces a new condition so the “resetPassword” API cannot be used to reset a device’s password. The change impacts both ransomware and disinfectors. Android.Lockdroid.E variantsRead More →