NetBSD security improved with the implementation of kernel ASLR (KASLR)

8 years ago

The development team at NetBSD is going to implement the KASLR (kernel Address Space Layout Randomisation) for 64-bit AMD processors. The…

Exclusive – CSE ZLab experts spotted a new Wonder botnet in the wild

8 years ago

The CSE CybSec Z-Lab Malware Lab spotted a new botnet, dubbed Wonder botnet, while it was investigating malicious code in…

AhMyth Android RAT, another open source Android RAT Tool available on GitHub

8 years ago

The source code of a new Android Remote Administration Tool is available on GitHub, it is dubbed AhMyth Android RAT. You just…

DHS and FBI warn of ongoing attacks on energy firms and critical infrastructure

8 years ago

The US DHS and the FBI have issued a warning that APT groups are actively targeting energy firms and critical…

Security Affairs newsletter Round 133 – News of the week

8 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…

APT28 group is rushing to exploit recent CVE-2017-11292 Flash 0-Day before users apply the patches

8 years ago

The APT28 group is trying to exploit the CVE-2017-11292 Flash zero-day before users receive patches or update their systems. Security…

A leaked document raises a doubt about NSA knew the #Krack attack since 2010

8 years ago

An NSA leaked document about the BADDECISION hacking tool raises the doubt about National Security Agency knew the Krack attack…

Proton malware spreading through supply-chain attack, victims should wipe their Macs

9 years ago

The dreaded Proton malware was spreading through a new supply-chain attack that involved the Elmedia apps, victims should wipe their…

Assemblyline – Canada’s CSE intelligence Agency releases its malware analysis tool

9 years ago

Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed…

Necurs botnet now spreading the Locky Ransomware via DDE Attacks

9 years ago

Operators behind Locky ransomware campaigns have switched to new attack techniques to evade detection leveraging the DDE protocol. Security experts are continuing to observe…

This website uses cookies.