Study shows connections between 2000 malware samples used by Russian APT groups

6 years ago

A joint research from Intezer and Check Point Research shows connections between nearly 2,000 malware samples developed by Russian APT groups. A…

USBsamurai for Dummies: How To Make a Malicious USB Implant & Bypass Air-Gapped Environments for 10$. The Dumb-Proof Guide.

6 years ago

The popular researcher Luca Bongiorni described how to make a malicious USB Implant (USBsamurai) that allows bypassing Air-Gapped environments with…

Emsisoft releases a free decryptor for the WannaCryFake ransomware

6 years ago

Researchers at Emsisoft security firm have released a new free decryption tool for the WannaCryFake ransomware. Good news for the…

Czech Intelligence ‘s report attributes major cyber attack to China

6 years ago

The Czech Intelligence agency blames China for a major cyber attack that hit a key government institution in the Czech…

Heyyo dating app left its users’ data exposed online

6 years ago

Another day, another embarrassing data leak made the headlines, the online dating app Heyyo left a server exposed on the…

US Utilities Targeted with LookBack RAT in a new phishing campaign

6 years ago

Security experts at Proofpoint observed a new wave of phishing attacks aimed at US Utilities in an attempt to deliver…

Adobe Patches two critical vulnerabilities in ColdFusion

6 years ago

Adobe released security updates to address three severe vulnerabilities in its ColdFusion web application development platform Adobe released ColdFusion 2016…

Hacker discloses details and PoC exploit code for unpatched 0Day in vBulletin

6 years ago

An anonymous hacker disclosed technical details and proof-of-concept exploit code for a critical zero-day remote code execution flaw in vBulletin.…

A new Fancy Bear backdoor used to target political targets

6 years ago

Security experts at ESET have uncovered a new campaign carried out by Russia-linked Fancy Bear APT group aimed at political…

APT or not APT? What’s Behind the Aggah Campaign

6 years ago

Researchers at Yoroi-Cybaze ZLab discovered an interesting drop chain associated with the well-known Aggah campaign. Introduction During our threat monitoring…

This website uses cookies.