Security Experts at Intercrawler have discovered in the underground a new Exploit-Kit dubbed "Infinity" which might be a new replacement…
FireEye published a report titled "Operation Saffron Rose" to document the activities of the Iranian hacking group named Ajax Security…
Unknown hackers have stolen files on the Ukraine crisis from the Belgian Foreign Ministry, causing the crackdown of targeted servers.…
Check Point 2014 Security Report shows major security events occurred in 2013 show and provides useful information on current malware…
Security experts at McAfee Labs have discovered a new cyber espionage based on the malware digitally signed with stolel certificates.…
Discover how it is possible to apply steganography to hide secret messages in common tweets (or any text) with steg.js-of-the-dump.…
Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in…
Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting .lnk files.…
Romanian Researcher discovered that Skype application store sensitive User Data Unencrypted on a local database. A Romanian programmer at Hackyard Security Group, Dragoş Gaftoneanu,…
Securi firm has published an interesting post to explain how malware authors could hide a backdoor using PHP Callback functions.…
This website uses cookies.