Reports

Akamai Report: Credential stuffing attacks are a growing threat

According to Akamai's latest State of the Internet report on credential stuffing, credential stuffing continues to be growing threat. According to Akamai…

6 years ago

Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”

Experts at the CSE Cybsec Z-Lab have found a Gafgyt variant implementing the VanillaUPX technique recently presented in a cybersecurity…

6 years ago

Evolution of threat landscape for IoT devices – H1 2018

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting…

6 years ago

GAO Report shed the lights on the failures behind the Equifax hack

A new report from the U.S. Government Accountability Office (GAO) provides detailed information of the Equifax hack. The Equifax hack…

6 years ago

The main source of infection on ICS systems was the internet in H1 2018

Researchers from Kaspersky have published a new report on the attacks on ICS systems observed by its products in the…

6 years ago

Android mobile devices from 11 vendors are exposed to AT Commands attacks

A group of researchers has conducted an interesting study on AT commands attacks on modern Android devices discovering that models…

6 years ago

2.6 billion records exposed in 2,308 disclosed data breaches in H1

According to a report from cyber threat intelligence firm Risk Based Security some 2.6. billion data records have been exposed in data…

6 years ago

Cyber Defense Magazine – August 2018 has arrived. Enjoy it!

Cyber Defense Magazine August 2018 Edition has arrived. Sponsored by: Bosch We hope you enjoy this month's edition...packed with 130+ pages of…

6 years ago

Group-IB experts record a massive surge of user data leaks form cryptocurrency exchanges

Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts…

6 years ago

Analyzing the Telegram-based Android remote access trojan HeroRAT

Researchers at CSE Cybsec ZLab analyzed shared published their analysis of the Telegram-based Android RAT tracked as HeroRAT. In June, researchers…

6 years ago

This website uses cookies.