Reports

Experts observed the growth of hi-tech crime landscape in Asia in 2018

Security experts at Group-IB presented at Money2020 Asia the results of an interesting analysis of hi-tech crime landscape in Asia…

7 years ago

Torrent Risks: How to get infected through torrent with a good reputation

Experts at Z-Lab Yoroi/Cybaze have conducted an interesting analysis on the risks for users downloading films, games, and software through…

7 years ago

2 HackerOne members received each over $1M via Bug programs

Bug bounty platform HackerOne announced that two of its members have each earned more than $1 million by participating bug…

7 years ago

Crooks offer millions to skilled black hats to help them in extortion campaigns

Cybercriminals are offering over a million dollars per year to skilled professionals like vxers and penetration testers to help them…

7 years ago

Reading the ENISA Threat Landscape Report 2018

According to the ENISA Threat Landscape Report 2018, 2018 has brought significant changes in the techniques, tactics, and procedures associated…

7 years ago

Cranes, drills and other industrial machines exposed to hack by RF protocols

Researchers from Trend Micro have analyzed the communication protocols used by cranes and other industrial machines and discovered several flaws.…

7 years ago

Too many issues in Pentagon networks expose it to cybersecurity risks

A new security assessment conducted by the Defense Department Inspector General revealed that the Pentagon is still exposed to many cyber risks,…

7 years ago

Facebook tracks non-users via Android Apps

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According to a report presented…

7 years ago

US ballistic missile defense systems (BMDS) open to cyber attacks

U.S. Ballistic Missile Defense Systems Fail Cybersecurity Audit US DoD Inspector General's report revealed United States' ballistic missile defense systems…

7 years ago

M2M protocols can be abused to attack IoT and IIoT systems

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of…

7 years ago

This website uses cookies.