Reports

Techniques for the manipulation of malicious payloads to improve evasion

Security researchers at the iSwatlab have conducted an analysis of a few methods for the creation of some malicious payloads…

8 years ago

Roughly 200,000 Devices still affected by the Heartbleed vulnerability

More than two years after the disclosure of the HeartBleed bug, 200,000 services are still affected. Systems susceptible to Heartbleed…

8 years ago

Mozilla Internet Health Report calls for more security and privacy

The Mozilla foundation has published its first Internet Health Report to analyze the dangers of the Internet that we can…

8 years ago

Cyber crimes spike in England and Wales, says ONS

For the first time the England the Office for National Statistics (ONS) includes data related hacking and fraud, and findings…

8 years ago

Intelligence report claims the Kremlin has cracked Telegram service

A raw intelligence document published last week claims Russian cyber experts have cracked Telegram messaging service to spy on opponents.…

8 years ago

President Putin ordered cyber attacks and propaganda to influence US Election

Putin ordered cyber attacks and propaganda to influence Election. Reading the “Assessing Russian Activities and Intentions in Recent US Elections”…

8 years ago

FBI-DHS JAR report links Russian hackers to Presidential Election hacks

A FBI-DHS JAR report released implicated Russian hacking group APT28 and APT29 in attacks against 2016 Presidential Election. The Department…

8 years ago

More than 8,800 WordPress Plugins out of 44,705 are flawed

Security firm RIPS Technologies has analyzed 44,705 in the official WordPress plugins directory and discovered that more than 8,800 of…

8 years ago

UK National Security Strategy, Cyber Security is a top priority

The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers…

8 years ago

Adobe Flash Player flaws remain the most used by Exploit Kits

Experts from the firm Recorded Future published a report on the most common vulnerabilities used by threat actors in the…

8 years ago

This website uses cookies.