Feds request Judge to review the order to reveal TOR Exploit Code
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeksRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeksRead More →
Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites. In late August 2015, Symantec identified a previously unknownRead More →
Infected websites are hard to detect, only show up for users coming off search engines and for search bots. A new black hat SEO campaign is leveraging a combination of hackedRead More →
In-brief: Andrew Auernheimer, an online provocateur who uses the handle “Weev,” has taken credit for causing 30,000 Internet connected printers to spew out antisemitic statements. Many of the connected printersRead More →
Although the government officially withdrew from its battle against Apple Monday, many observers sense the tech privacy war is just getting started. “This lawsuit may be over, but the Constitutional andRead More →
As more US companies snuff out point of sale malware by deploying chip-and-PIN bankcard technology, attackers are rushing to exploit existing magnetic strip card systems still vulnerable to malware. ARead More →
Popular open source shopping cart app Zen Cart is warning its users of dozens of cross-site scripting vulnerabilities found in its software. Affected websites, security experts say, risk exposing customersRead More →
Google is improving its Gmail warning service to help protect the customers from state-sponsored hacking and surveillance activities. Google confirmed that one million Gmail accounts might have been targeted byRead More →
According to a recent report, Germany nuclear plants are vulnerable to terrorists and there needs to be some serious dealing with this problem. According to a recently released report, GermanyRead More →
Gumtree is a free classified advertising site and subsidiary of eBay particular popular in the UK, Australia, and South Africa. Gumtree is the number one local classifieds in Australia with 47.8M monthly visits* andRead More →
Nothing is safe these days, not even Node’s npm.The Node.js Package Manager (or just npm) allows the author of a malicious package to infect other packages and propagate malicious scriptsRead More →
Security researchers from the Cheetah Mobile Security Research Lab discovered a severe flaw in the call management application Truecaller. Recently, security researchers from the Cheetah Mobile Security Research Lab discoveredRead More →
One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its goal. For this, they have invested a lotRead More →
A bill proposed in congress this week would require that all users provide identification and register prepaid ‘burner’ phones upon purchase. Earlier this week we reported that burner phones are what keptRead More →
The IDs and passwords of about 18 million Internet users have been found on a computer server set up by a Tokyo company, which was found in November to haveRead More →
The Carbon Black Threat Research Team has recently discovered a new family of ransomware, which they dubbed “PowerWare,” that targets organizations via Microsoft Word and PowerShell. PowerShell is the scriptingRead More →
Researchers at Fox-IT warn that the website of security certification provider EC Council has been compromised to host the malicious Angler Exploit Kit. No one is secure, we are allRead More →
A new ransomware has been discovered by security researcher Yonathan Klijnsma called Maktub Locker that shows the most attention to detail that I have see on its ransomware payment site. Before we get toRead More →
Hackers reportedly stole the records of 1.5 million customers of Verizon Enterprise which are offered for sale in the criminal underground. According to KrebsOnSecurity, data leaked after a security reach at VerizonRead More →
Petya uses old-school ransomware tactics, seems to be doing fine without employing powerful encryption. Malware experts from German security firm G DATA have found a new type of lock-ransomware that usesRead More →