Spam Campaign Causes “DDoS” by Googlebot
Every once in a while we get a glimpse into rare and strange behavior that doesn’t involve the website being hacked, but causes major problems for website owners. We haveRead More →
Every once in a while we get a glimpse into rare and strange behavior that doesn’t involve the website being hacked, but causes major problems for website owners. We haveRead More →
In a new Ubuntu Security Notice (USN-2814-1), Canonical announced that they have patched a security vulnerability in the Nvidia proprietary graphics drivers for all supported Ubuntu Linux operating systems. AccordingRead More →
CARNEGIE MELLON’S researchers pulled their talk on cracking the protections of the anonymity software Tor from the schedule of the Black Hat security conference in 2014, the university has beenRead More →
Hide your Windows 10 & Edge browser, Dyreza is coming!. A new variant of the Dyreza banking trojan comes with support for Microsoft’s latest products, the Windows 10 operating system andRead More →
loud access keys hardcoded inside apps leave users exposed to data theft, and developers vulnerable to server hijacking Researchers from the Technical University in Darmstadt, Germany, have carried out anRead More →
Digital rights group takes down Pawn Storm base. The (EFF) has been awarded control of its namesake domain, which was being used to install malware on people’s computers. The EFFRead More →
Reformed hacker says that US government websites especially FBI and Home Office are easiest to hack. You would be surprised to know that one of the easiest sites to hackRead More →
A potential standard for securing network-connected pacemakers, automobiles, and other lightweight devices has suffered a potentially game-over setback after researchers developed a practical attack that obtains its secret cryptographic key.Read More →
At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it’s behaving properly. Whilst doing this recently,Liam found aRead More →
Often we come across times where binary reconstruction while analyzing malware / unpacking malware is required . Taking leverage of automated tools is not always useful, sometimes manual reconstruction isRead More →