Group-IB published the annual HIGH-TECH CRIME TRENDS 2014 Report, a document focused on high-tech crimes associated with traditional computer crime.…
A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…
ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years…
Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx…
The security expert Federico Fazzi has disclosed a serious vulnerability in the Addthis.com service that allows attackers to take control…
Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers…
Researcher explains that vulnerable code re-use of zero-day in Android's CyanogenMod exposes million users to Man-In-The-Middle attacks. Security experts always…
Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months.…
iSIGHT Partners firm uncovered a Russian hacking team dubbed Sandworm that was running a cyber espionage campaign on NATO and…
A security expert defined a new attack technique dubbed Reflected File Download that allows to serve a 'Zero-Day' Worm without…
This website uses cookies.