DeepLocker – AI-powered malware are already among us

8 years ago

Security researchers at IBM Research developed a "highly targeted and evasive" AI-powered malware dubbed DeepLocker and will present today. What about Artificial…

BIND DNS software includes a security feature that could be abused to cause DoS condition

8 years ago

The Internet Systems Consortium (ISC) announced the presence of a serious flaw in the BIND DNS software that can be…

Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

8 years ago

WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake news through group…

Snapchat source Code leaked after an iOS update exposed it

8 years ago

Hackers leaked the Snapchat source code on GitHub, after they attempted to contact the company for a reward. Hackers gained…

GitHub started warning users when adopting compromised credentials

8 years ago

In order to improve the security of its users, the popular software code hosting service GitHub is now alerting account…

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

8 years ago

Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as 'Black' botnet, created by Ramnit operators. Security…

Hacking WiFi Password in a few steps using a new attack on WPA/WPA2

8 years ago

A security researcher has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most…

TSMC Chip Maker confirms its facilities were infected with WannaCry ransomware

8 years ago

TSMC shared further details on the attack and confirmed that its systems were infected with a variant of the infamous WannaCry ransomware. Early…

Duo Security created open tools and techniques to identify large Twitter botnet

8 years ago

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be…

Group-IB experts record a massive surge of user data leaks form cryptocurrency exchanges

8 years ago

Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts…

This website uses cookies.