High-severity bugs in 25 Symantec/Norton products imperil millions
If you use a Symantec or Norton product, now would be a good time to update. Much of the product line from security firm Symantec contains a raft of vulnerabilities thatRead More →
If you use a Symantec or Norton product, now would be a good time to update. Much of the product line from security firm Symantec contains a raft of vulnerabilities thatRead More →
Lizard Squad’s tool becomes very popular thanks to the millions of unsecured IoT devices ready for the taking. Security experts from Arbor Networks have uncovered over 100 botnets that areRead More →
IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, areRead More →
Last week Apple cleared the air as to whether or not it intentionally released an unencrypted version of its iOS 10 beta kernel to the developer community, stating the moveRead More →
Hackers have stolen $10 million from an unnamed Ukrainian bank, according to an independent IT monitoring organization. The Kyiv branch of ISACA, the Information Systems Audit and Control Association, reportedRead More →
As data-encrypting malware proliferates, new entrants search for ways to stand out. The crypto ransomware racket is a booming business thatgenerates lots of revenue, so it only makes sense thatRead More →
F YOU RECEIVE A FACEBOOK NOTIFICATION REGARDING A FRIEND TAGGING YOU IN A COMMENT BE VERY CAREFUL BEFORE CLICKING ON THE LINK IT CAN BE A JAVASCRIPT MALWARE FOUND TARGETINGRead More →
We recently noticed Retefe campaigns targeting UK banking customers. Using fake certificates, the Trojan is designed to trick victims into giving up their login credentials and other sensitive information. AtRead More →
Rooting malware is getting more popular with every new week. Security experts from Lookout have identified an app in Google Play Store that hides malware capable of rooting the user’s deviceRead More →
In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one ofRead More →
Millions of Office 365 business users likely effected. Starting June 22 at 6:44 a.m. UTC, Avanan’s Cloud Security Platform started to detect a massive attack against its customers that were usingRead More →
Our security operations team investigate and mitigate multiple denial of service (DDoS) attacks every single day. One recent case caught our attention because of the intensity and duration of the attack, andRead More →
The actors behind Dridex 220 and Locky Affid=3 have introduced a new ransomware called “Bart”. They are using the RockLoader malware to download Bart over HTTPS. Bart has a paymentRead More →
OurMine behind the hacking of Google CEO Sundar Pichai’s Quora account. In our recent article, we had reported that how new hacking group, OurMine have been targeting elite tech accounts aroundRead More →
Lenovo fixed two flaws (CVE-2016-5249, CVE-2016-5248) in the Lenovo Solution Center, once again the company faces problems with pre-installed bloatware. Lenovo has fixed two high severity vulnerabilities, CVE-2016-5249, and CVE-2016-5248,Read More →
Hacker will also have to pay £17,000 ($22,700) David Trail, 26, of Edinburgh, Scotland, will have to pay £17,000 ($22,700) as compensation and will serve 200 hours of unpaid work forRead More →
The hacker is asking over $700,000 for the whole data. A hacker that goes by the name of TheDarkOverlord has put up for sale on the Dark Web three databases stolenRead More →
The cyber security expert Benjamin Tedesco during his vacation in Vienna, Austria, has spotted an ATM skimmer quite impossible to detect to common people. Have you ever seen a skimmerRead More →
FOR YEARS HOLLYWOOD has waged a war on piracy, using digital rights management technologies to fight bootleggers who illegally copy movies and distribute them. For just as long, hackers haveRead More →
This post is aimed at those new to exploit development and wanting to understand the end-to-end process and types of techniques that need to be employed in order to realiseRead More →