Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the…
A change made months ago in an open-source JavaScript library introduced a cross-site scripting (XSS) vulnerability in Google Search. The…
The popular expert unixfreaxjp analyzed a new China ELF DDoS'er malware tracked as "Linux/DDoSMan" that evolves from the Elknot malware…
Another ransomware attack made the headlines, this time the victim is the City of Albany, its computer systems were infected…
Experts at Skylight Cyber released the list of 600 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS…
Microsoft this week announced that it had taken control of 99 domains used by an Iran-linked APT group tracked by…
A new cyber heist made the headlines, the victim is Bithumb, the South Korea-based cryptocurrency exchange and hackers stole $19…
The 20-year-old security researcher James Lee publicly disclosed details and proof-of-concept exploits for two zero-day vulnerabilities in Microsoft web browsers.…
Cisco revealed that security patches released in January to address flaws in Small Business RV320 and RV325 routers were incomplete.…
Commando VM — Turn Your Windows Computer Into A Hacking Machine FireEye released Commando VM, a Windows-based security distribution designed…
This website uses cookies.