A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI…
Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host.…
Security experts at Avast have analyzed a new strain of DDoS trojan targeting Linux operating system dubbed XOR.DDoS which embeds…
Security Experts discovered a new attack method to defeat Secure Boot security mechanism of the UEFI (Unified Extensible Firmware Interface).…
The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red…
BAE Systems Applied Intelligence has disclosed a Russian cyber espionage campaign codenamed as SNAKE that targeted Governments and Military Networks.…
Researchers at German G Data published an interesting analysis for Uroborun rootkit alleged to be a component of Russian cyber…
F-Secure's Chief Mikko Hyppönen at the TrustyCon explained the risk that Government-built malware and cyber weapons will run out of…
Yesterday I wrote about a new variant of malware able to use Google Docs function to hide communications to C&C servers, but…
I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This…
This website uses cookies.