The security experts Florian Bogner devised a method dubbed AVGater to escalate privileges by abusing the quarantine feature of some antiviruses. Several…
Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks.…
Could you tell us something about yourself? I have been involved in IT and information security for 25 years. I…
How much is the return on investment in the cybercriminal underground? Let's dig a report recently published by threat intelligence…
Security experts spotted a new malware dubbed Ordinypt, it is a wiper disguised as ransomware that currently only targets German…
Wikileaks released the first batch of documents starting with the source code and development logs of the Project Hive. Today…
Security experts have discovered a new hacking tool dubbed NEW IPCAM EXPLOIT containing a backdoor that is offered on several…
Intel's management engine - in most Positive Technologies plans to demonstrate at the next Black Hat conference how to hack…
Security experts at McAfee observed the Russian APT28 group using the recently reported the DDE attack technique to deliver malware in espionage…
The Google researcher Andrey Konovalov discovered several vulnerabilities in the Linux kernel USB subsystem using the Google Syzkaller fuzzer. Google…
This website uses cookies.