Malware Botnet Can Be Abused to Launch DDoS Attacks
DDoS attacks can have an amplification factor of 26.5. An independent security researcher that goes by the name of MalwareTech has discovered a way in which he could abuse the ZeroAccessRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
DDoS attacks can have an amplification factor of 26.5. An independent security researcher that goes by the name of MalwareTech has discovered a way in which he could abuse the ZeroAccessRead More →
Three years after the Snowden revelations, the proliferation of privacy-focused messaging apps, email clients, and other encryption services hasn’t yet managed to make the use of crypto less of aRead More →
During our continued efforts to protect our customers against the latest mobile threats, we came across another malicious app that used pornography to attract users. Noting that 1 in 5Read More →
Crook hijacks iCloud account, locks victim’s Mac.Crooks have discovered a method of turning Apple’s security features against the company’s users, hijacking Apple iCloud accounts and making them behave as ransomware,Read More →
New research finds “bitflipping” attacks may pose more risk than many admit. Physical weaknesses in memory chips that make computers and servers susceptible to hack attacks dubbed “Rowhammer” are more exploitableRead More →
Security researchers 2, Radamant coder 0.Researchers from InfoArmor, an Arizona-based cyber-security firm, have discovered an SQL injection flaw in the control panel of the Radamant ransomware that allows them toRead More →
Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack. Israeli software research company NorthBit claimed it hadRead More →
A kernel bug in Snapdragon chips may make billions of Android devices susceptible to hacks.A report from The Hacker News has shed light on a major problem with Qualcomm, Inc.’sRead More →
We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS malware is that instead of abusing enterprise certificatesRead More →
Legitimate code-signing certificates provide secret cover for attack groups. There are lots of ways to ensure the success of an advanced hacking operation. For a gang called Suckfly, one of theRead More →
Political dissidents and cyber criminals alike will soon be sending anonymous internet traffic through a library at Western University in Canada, thanks to a new “node” in the encrypted TorRead More →
According to experts at EndPoint security firm, crooks are buying many .om domains to carry on typosquatting attacks. Crooks are buying many .om domains to carry on typosquatting attacks. According toRead More →
New malvertising campaign may have exposed tens of thousands in the past 24 hours. Mainstream websites, including those published by The New York Times, the BBC, MSN, and AOL, are fallingRead More →
A China-based APT group has an insatiable appetite for stolen code-signing certificates. Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software andRead More →
Hacker admits crime, faces up to five years in jail. The US Department of Justice (DOJ) announced on Tuesday, March 15, that it charged Ryan Collins, 36, of Lancaster, Pennsylvania, ofRead More →
Short Bytes: The decentralized hacktivist group Anonymous has again tied their shoelaces to run after the Republican Presidential candidate Donald Trump. In a newly released video, the Guy Fawkes MaskRead More →
Introduction The concept of file-less malware is not a new one. Families like Poweliks, which abuse Microsoft’s PowerShell, have emerged in recent years and have garnered extensive attention due toRead More →
Attack ATM is very simple for criminals, a video released by Miami Beach Police shows two men installing a credit card skimmer in less than 3 seconds. In October, the CENTRALRead More →
Two teenagers were behind the whole hacking scheme. At the end of last week, Dutch police arrested two suspects on allegations of hacking multiple Instagram accounts and then using them toRead More →
Researchers analyze five AV-made system repair tools.System rescue tools provided by antivirus makers are often used to clean infected systems after the main antivirus software detects infections. Most antivirus makersRead More →