Mobile malware evolution 2020
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. The
Read moreThese statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. The
Read moreHalogen is a tool to automate the creation of yara rules against image files embedded within a malicious document. Halogen
Read moreStandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution
Read moreThis blog is part of an ongoing series sharing key takeaways from Rapid7’s 2020 Cloud Security Executive Summit. Interested in
Read moreTop executives of the software firm SolarWinds blamed an intern for having used a weak password for several years, exposing
Read moreByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection.
Read moreThe National Security Agency (NSA) published a document to explain the advantages of implementing a zero-trust model. The National Security
Read moreDuring a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting
Read moreIn February 2021, a series of “free” VPN services were breached including SuperVPN and GeckoVPN, exposing over 20M records. The
Read moreCybersecurity experts from Proofpoint have unearthed a Chinese-sponsored phishing campaign and published a report on Thursday; as per the
Read moreAfter an undisclosed number of subscribers were reportedly hit by SIM swap attacks, American telecommunications company T-Mobile has announced
Read moreThe problem will also affect Russian government agencies, which are switching to domestic Linux operating systems as part of import
Read moreResearchers have uncovered gaps in Amazon’s skill vetting process for the Alexa voice assistant ecosystem that could permit a
Read moreA Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential caching and
Read moreA Forensic Evidence Acquirer Compile Assuming you have Rust 1.41+ installed. Open terminal in the project directory and to compile
Read moreThe New Zealand-based cryptocurrency exchange Cryptopia suffered a new cyber heist while it is in liquidation due to a 2019
Read moreA new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for
Read moreA critical authentication bypass vulnerability could be exploited by remote attackers to Rockwell Automation programmable logic controllers (PLCs). A critical
Read more‘Hotarus Corp’ Ransomware operators hacked Ecuador’s largest private bank, Banco Pichincha, and the country’s Ministry of Finance. A cybercrime group
Read moreVPNs have been a subject of deliberation for a long time. Is it even important to use one? I think
Read moreData related to a customer of a recently targeted California-based private cloud solutions firm Accellion is being published online
Read moreOver the past year, a broader pattern of WordPress malware with SQL triggers has occurred within infected databases to
Read morePillager is designed to provide a simple means of leveraging Go’s strong concurrency model to recursively search directories for sensitive
Read moreGatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it
Read more