Cybersecurity

ReVuln team founds a zero-day in SCADA component

At S4x14 Conference in Miami, a researcher at of ReVuln disclosed a buffer overflow zero-day flaw in HMI software produced…

10 years ago

TDoS products evolution in the underground market

Danco Danchev profiled a new TDoS product sold in underground based on 3G USB modem/GSM/SIM card, cybercrime is increasing its…

10 years ago

OPSEC novice … here the manual for perfect cyber criminals

Cyber security expert Dancho Danchev profiled a new OPSEC training services in the underground, a new trend that is converging…

10 years ago

TrendLabs Q3 Security Roundup on illegal activities

TrendLabs has just published the third quarterly report, titled The Invisible Web Unmasked, on the evolution of cybercrime observed in…

10 years ago

FireEye has identified a new IE zero-day exploit

FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual…

10 years ago

Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy - Intro to reconnaissance phase for…

11 years ago

Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa…

11 years ago

Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy…

11 years ago

WSIS Forum 2013 – Securing Cyberspace in a borderless world

“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was…

11 years ago

The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…

11 years ago

This website uses cookies.