Hacking

Vawtrak v2, a close look at the cybercriminal groups behind the threat

Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its…

9 years ago

CVE-2016-6415 – CISCO confirms a new Zero-Day linked to Equation Group hack

Cisco revealed the existence of another zero-day vulnerability, tracked as CVE-2016-6415, in the Equation Group archive leaked by the Shadow…

9 years ago

Hacking industrial processes with and undetectable PLC Rootkit

Two security researchers have developed an undetectable PLC rootkit that will present at the upcoming Black Hat Europe 2016. The…

9 years ago

Mozilla will fix the cross-platform RCE flaw that threatened Tor anonymity

Mozilla plans to fix the cross-platform RCE flaw that threatened Tor anonymity. The flaw affects certificate pinning protections implemented by…

9 years ago

GCHQ plans to protect the country with a national firewall

The British intelligence agency GCHQ is planning to create to protect the country from cyber attacks by creating a national firewall.…

9 years ago

Researchers discovered security flaws in the Android version of Signal app

The security duo Markus Vervier and Jean-Philippe Aumasson have discovered multiple flaws in the Android version the popular Signal app.…

9 years ago

NAND mirroring – Unlock San Bernardino shooter’ iPhone with just $100

A researcher has demonstrated that the NAND mirroring technique was able to bypass the passcode retry limitations on the San…

9 years ago

Cisco releases multiple Security Updates, it fixed a nasty RCE in WebEx Meetings servers

Cisco has released several Security Updates to fix many vulnerabilities in its products, including a nasty RCE in WebEx Meetings…

9 years ago

Mamba: The new Full Disk Encryption Ransomware Family Member

A Brazilian Infosec research group, Morphus Labs, just discovered a new Full Disk Encryption (FDE) Ransomware this week, dubbed Mamba.…

9 years ago

A backdoor on Xiaomi device allows silent and remote deliver of any app

A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any…

9 years ago

This website uses cookies.