Israel surveillance firm NSO group can mine data from major social media

7 years ago

The Israeli surveillance firm NSO Group informed its clients that it is able to scoop user data by mining from…

Dutch police arrested the author of Dryad and Rubella Macro Builders

7 years ago

Dutch authorities announced the arrest of a 20-year old man for allegedly developing Dryad and Rubella Macro Builders. Dutch authorities…

Poland and Lithuania fear that data collected via FaceApp could be misused

7 years ago

Poland and Lithuania are probing the potential privacy and security risks of using a Russian-made app FaceApp. Millions of people…

Slack resetting passwords for roughly 1% of its users

7 years ago

Slack is resetting passwords for accounts belonging to users that have not secured them after the data breach suffered by…

The Problem With the Small Business Cybersecurity Assistance Act

7 years ago

The Small Business Cybersecurity Assistance Act may provide business owners with access to government-level tools to secure small business against…

Experts detailed new StrongPity cyberespionage campaigns

7 years ago

Experts at AT&T’s Alien Labs recently discovered an ongoing campaign conducted by StrongPity threat actor that abuses malicious WinBox installers…

CVE-2019-6342 flaw allows hackers to fully compromise Drupal 8.7.4 websites

7 years ago

Drupal developers urge users to update their installs to version 8.7.5, which addresses the CVE-2019-6342 flaw that allows hackers to…

Scraping the TOR for rare contents

7 years ago

Cyber security expert Marco Ramilli explains the difficulties for scraping the 'TOR networks' and how to enumerate hidden-services with scrapers.…

Experts spotted a rare Linux Desktop spyware dubbed EvilGnome

7 years ago

Experts at Intezer discovered a new backdoor, dubbed EvilGnome, that is targeting Linux systems for cyber espionage purpose. Intezer spotted…

Anti-Debugging Techniques from a Complex Visual Basic Packer

7 years ago

One of the latest trends for the attackers is to leverage the ISO files to avoid detection, the technique has…

This website uses cookies.