The Oracle of Delphi Will Steal Your Credentials
It was one of those warm summer nights, no clouds, just a bright full moon lighting the way. Someone had unknowingly stumbled upon our honeypot, completely unaware of the factRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
It was one of those warm summer nights, no clouds, just a bright full moon lighting the way. Someone had unknowingly stumbled upon our honeypot, completely unaware of the factRead More →
The online storage platform Dropbox suffered a massive blow back in August when the company learned that over 60 million of its user accounts got hacked and credentials stolen byRead More →
The newly-discovered bug gives attackers the chance to execute code through the open-source JPEG 2000 codec. Cisco Talos researchers have uncovered a severe zero-day flaw in the OpenJPEG JPEG 2000Read More →
On Monday morning, a number of professionals in the aerospace industry received a rather mundane email containing a PDF ostensibly about the future of Russian aerospace programs, but which actuallyRead More →
Recent research on web security and related topics. Provided and maintained by members and friends of the Chair for Network and Data Security, Horst Görtz Institute, Ruhr-University Bochum. Do youRead More →
Yesterday, I stumbled on a post where a Reddit user named Haydaddict was alerting people about some hacked Steam accounts spreading malware. As I am always interested in new malware, I took a lookRead More →
AS IOS AND Android mature, the stand-off between platforms and hackers escalates in kind. Each release brings new security measures, while those who want to break in—nation-state intelligence agencies andRead More →
Kaspersky posted a great article about their TeamXrat Ransomware analysis and how they were able to create a decryptor for its victims. Reported back in mid September in our forums, I and other security researchersRead More →
We recently observed Hancitor attacks against some of our FireEye Exploit Guard customers. The malicious document used to deliver the Hancitor executable was observed being distributed as an attachment inRead More →
Ransomware in its various forms continues to make headlines as much for high-profile network disruptions as for the ubiquity of attacks among consumers. We recently noted the non-linear growth ofRead More →