#AVGater attack abuse Quarantine vulnerabilities for privilege escalation

8 years ago

The security experts Florian Bogner devised a method dubbed AVGater to escalate privileges by abusing the quarantine feature of some antiviruses. Several…

TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

8 years ago

Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks.…

#AskACISO Interview with Paul Rivers, CISO at Yale University

8 years ago

Could you tell us something about yourself? I have been involved in IT and information security for 25 years. I…

Experts explain the Return on Investments in the cybercriminal underground

8 years ago

How much is the return on investment in the cybercriminal underground? Let's dig a report recently published by threat intelligence…

Ordinypt is a wiper disguised as ransomware that targets German users

8 years ago

Security experts spotted a new malware dubbed Ordinypt, it is a wiper disguised as ransomware that currently only targets German…

Vault 8 – WikiLeaks releases source code for CIA Hive malware control platform

8 years ago

Wikileaks released the first batch of documents starting with the source code and development logs of the Project Hive. Today…

Hack the hackers. Watch out the NEW IPCAM EXPLOIT, it is a scam!

8 years ago

Security experts have discovered a new hacking tool dubbed NEW IPCAM EXPLOIT containing a backdoor that is offered on several…

Experts can hack most CPUs since 2008 over USB by triggering Intel Management Engine flaw

8 years ago

Intel's management engine - in most Positive Technologies plans to demonstrate at the next Black Hat conference how to hack…

Russia-Linked APT28 group observed using DDE attack to deliver malware

8 years ago

Security experts at McAfee observed the Russian APT28 group using the recently reported the DDE attack technique to deliver malware in espionage…

Google Syzkaller fuzzer allowed to discover several flaws in Linux USB Subsystem

8 years ago

The Google researcher Andrey Konovalov discovered several vulnerabilities in the Linux kernel USB subsystem using the Google Syzkaller fuzzer. Google…

This website uses cookies.