Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges

7 years ago

Group-IB and Swiss insurance broker ASPIS that owns CryptoIns project, have developed the world’s first scoring model for assessing cryptocurrency exchanges Group-IB, an international…

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

7 years ago

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a…

IBM Watson will be used by NIST to assign CVSS scores to vulnerabilities

7 years ago

The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to…

Shellbot Botnet Targets IoT devices and Linux servers

7 years ago

Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot. The malware was distributed…

New attack by Anonymous Italy: personal data from ministries and police have been released online

7 years ago

New attack by Anonymous Italy: personal data from ministries and police have been released online. The site of Fratelli d’Italia,…

Google dorks were the root cause of a catastrophic compromise of CIA’s communications

7 years ago

Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens…

Flaw in Icecast streaming media server allows to take off online Radio Stations

7 years ago

Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast…

High severity XML external entity flaw affects Sauter building automation product

7 years ago

A security researcher has found a serious vulnerability in a building automation product from Sauter AG that could be exploited to steal…

USB drives are primary vector for destructive threats to industrial facilities

7 years ago

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published…

PortSmash flaw in Hyper-Threading CPU could allow sensitive data theft

7 years ago

PortSmash side-channel flaw that could be exploited with a timing attack to steal information from other processes running in the…

This website uses cookies.