Internet Explorer Bug Leaks What Users Type in the URL Address Bar
Microsoft’s Internet Explorer browser is affected by a serious bug that allows rogue sites to detect what the user is typing in his URL address bar. This includes new URLsRead More →
Microsoft’s Internet Explorer browser is affected by a serious bug that allows rogue sites to detect what the user is typing in his URL address bar. This includes new URLsRead More →
Experts believe a state-sponsored hacker was behind the attack, which affected 2.2 million people. The recent attack that resulted in 2.2 million users installing infected versions of a popular Windows systemRead More →
Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placedRead More →
LAS VEGAS—A novel attack vector allows for adversaries to abuse the Docker API to hide malware on targeted systems, and even execute remote code. The proof of concept attack wasRead More →
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive,Read More →
Over 500,000 users have had their computers infected with a stealthy malware named Stantinko, according to a 99-page report released yesterday by Slovak antivirus maker ESET. The malware is a modularRead More →
Each day, countless of security researchers are fighting the good fight in an effort to help companies remove malware from infected computers and servers. These researchers have to go throughRead More →
Moscow-based threat intelligence firm Group-IB published a report that details evidence linking the Lazarus APT Group to North Korea. Researchers at security firm Group-IB released a report that links theRead More →
Known as USA 276, it looks to be headed for the International Space Station, says one amateur spy satellite tracker. Then again, it could change course. The secret spy satelliteRead More →
The Sednit group, also known as APT28, Fancy Bear and Sofacy, is a group of attackers operating since at least 2004 and whose main objective is to steal confidential informationRead More →