Researchers from SEC consult analyzed more than 4000 firmware's embedded devices, where is included devices belonging to 70 vendors. The…
A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is…
Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I'm…
A research published by CyberArk Labs focuses on targeted attacks against organizational networks, analyzing hackers' methods, tools and techniques. Bad…
Experts from Check Point firm published a new report on the Rocket Kitten APT that include more insight into the…
Security Experts at InfoArmor discovered GovRAT, a malware-signing-as-a-service platform that is offered to APT groups in the underground. In the…
The ISACA study "2015 Advanced Persistent Threat Awareness-Third Annual" tries to uncover information security professionals’ understanding of APT threats. A…
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…
A new research conducted by Citizen Lab revealed that the number of governments using the FinFisher surveillance software has increased.…
Researchers probed 20,400 Android devices and found 87.7 per cent contained at least one exploitable vulnerability due to a slow…
This website uses cookies.