Experts at Cylance noticed that the decoy document used in KONNI attacks is similar to the one used in recent campaigns of the DarkHotel APT. In May, Cisco Talos team discovered a RAT dubbed KON ...
A team of experts showed that a simple sticker attached on a sign board can confuse any self-driving car and potentially lead an accident. We have discussed car hacking many times, it is a scaring ...
SAP just released another set of security patches for its products to address a total of 19 vulnerabilities, most common vulnerability type is XSS. On Tuesday, SAP released a set of security patches ...
The FBI used a NIT involving a specially crafted video file to unmask a sextortionist that via Tor was threatening youngsters. The FBI has used once again the network investigative technique (NIT) ...