Hacking

The Cobalt Hacking crew is still active even after the arrest of its leader

Group-IB has released a new report on Cobalt group’s attacks against banks and financial sector organizations worldwide after the arrest of…

8 years ago

Researchers And The FBI Work Together to Take Down the Russian VPNFilter Botnet Targeting Home Routers

Researchers and the FBI are working together to take down the dreaded VPNFilter botnet composed of hundreds of thousands of…

8 years ago

BackSwap Trojan implements new techniques to steal funds from your bank account

Security experts at ESET have spotted a new strain of banking trojan named BackSwap Trojan that implements new techniques to…

8 years ago

MalHide Malware uses the compromised system as an eMail relay

The cybersecurity experts Marco Ramilli analyzed a new sample of malware dubbed MalHide that implements a quite new attack path to…

8 years ago

Hackers defaced screens at Mashhad airport in Iran protesting the government

On Thursday 24th May, hackers defaced the screens at the Mashhad airport in Iran to protest ùthe Government and the military’s…

8 years ago

Experts noticed an ongoing activity involving the RIG Exploit Kit to deliver the Grobios Trojan

Malware researchers from FireEye recently noticed an interesting ongoing activity involving the infamous RIG Exploit Kit (EK) to deliver the…

8 years ago

Security Affairs newsletter Round 164 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

8 years ago

Experts show how to defeat AMD’s Secure Encrypted Virtualization

German researchers devised a method, dubbed SEVered, to defeat the security mechanisms Secure Encrypted Virtualization implemented by the AMD Epyc server…

8 years ago

CVE-2018-7783 flaw in Schneider SoMachine Basic can be exploited to read arbitrary files on the targeted system

Schneider Electric issued a security update for its EcoStruxure Machine Expert (aka SoMachine Basic) product that addresses a high severity…

8 years ago

More than 100 Million IoT devices potentially exposed to Z-Shave Z-Wave attack

Researchers from Pen Test Partners have conducted an analysis of Z-Wave wireless communications protocol used by millions of IoT devices and discovered that…

8 years ago

This website uses cookies.