Experts at Yoroi – Cybaze Z-Lab analyzed MuddyWater Infection Chain

7 years ago

Malware researchers at Yoroi - Cybaze Z-Lab analyzed the MuddyWater Infection Chain observed in a last wave of cyber attacks.…

Evidence in Marriott’s subsidiary Starwood hack points out to China intel

7 years ago

According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to…

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

7 years ago

Takuya Yoshida from Toyota's InfoTechnology Center and his colleague Tsuyoshi Toyama are members of a Toyota team that developed the…

Ukraine’s SBU: Russia carried out a cyberattack on Judiciary Systems

7 years ago

Ukraine is accusing Russian intelligence services of carrying out cyberattacks against one of its government organizations. Ukraine's security service SBU announced…

DHS and FBI published a joint alert on SamSam Ransomware

7 years ago

The US Department of Homeland Security (DHS) and the FBI issued a joint alert on SamSam attacks targeting critical infrastructure.…

CVE-2018-15982 Adobe zero-day exploited in targeted attacks

7 years ago

Adobe released security updates for Flash Player that address two vulnerabilities, including a critical flaw, tracked as CVE-2018-15982, exploited in targeted attacks.…

Fractured Block Campaign: CARROTBAT dropper dupports a dozen decoy document formats

7 years ago

Palo Alto Networks recently discovered a malware dropper, dubbed CARROTBAT, that supports a dozen decoy document file formats to drop…

Email accounts of top NRCC officials were hacked in 2018

7 years ago

Threat actors had access to the email accounts of at least four NRCC aides and spied on thousands of sent…

New strain of Ransomware infected over 100,000 PCs in China

7 years ago

Security experts reported a new strain of malware spreading in China, the malicious code rapidly infected over 100,000 PCs in…

M2M protocols can be abused to attack IoT and IIoT systems

7 years ago

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of…

This website uses cookies.