A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI…
Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal…
The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security…
Ongoing incidents have brought to light the power of both Russia and China in the field of cyber espionage. Their…
Researchers at the Fujitsu Security Operations Center spotted a strain of Dyre being served exploiting hundreds of compromised home routers.…
On 16 and 17 June the Europol coordinated an international law enforcement operation against airline fraudsters at 140 airports across…
The French researcher Kafeine confirmed that the author of the Magnitude exploit kit have added the code to exploit the…
Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on…
The customers of popular travel websites are targeted by phishing scam in an attempt to lure them into disclosing personal…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
This website uses cookies.