New Golang brute-forcer discovered amid rise in e-commerce attacks
E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware shoppers....
E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware shoppers....
On February 23, 2019, Anomali Labs found a suspicious-looking subdomain transportationgovbidsynckelapw containing the legitimate domain transportation.gov for the U.S. Department...
Two high-severity flaws in the SHAREit Android app allow an attacker to bypass the file transfer application’s device authentication mechanism...
A recent malware sample forwarded to our Threat Intelligence service had some very interesting properties which we think would be useful to...
Mozilla has told the Australian government that its anti-encryption laws could turn its own employees into insider threats.The Mozilla Corporation,...
Hackers are impersonating recruitment agencies on LinkedIn in a bid to target companies with backdoor malware. Researchers at Proofpoint found...
Academics from Greece have devised a new browser-based attack that can allow hackers to run malicious code inside users' browsers...
Cyber criminals are willing to pay more than a million dollars a year to skilled information security professionals who are willing to...
Security researchers have discovered a new Malspam campaign exploiting the recently discovered WinRAR ACE flaw to install malware on the...
Executive Summary Since at least 2015, a suspected South Asian threat grouping known as BITTER has been targeting Pakistan and Chinese organizations...
Russian programmer Stanislav Lisov, extradited to the United States from Spain in 2018, pleaded guilty to conspiring to commit a...
Marriott let me know that the hack of their systems released my unencrypted passport number and unencrypted credit card number....
As North Korea tries to rev up its economy, it may shift its hacking efforts from financial thievery to stealing...
Dmitry Artimovich, who on several occasions had been referred to as a "Russian hacker” by the world's largest news publications...
In January 2019, current versions of Ubuntu Linux were found to be vulnerable to local privilege escalation due to a...
The remote execution flaw exists because some field types do not properly sanitize data from non-form sources and this can...
Linux Kernel is prone to an arbitrary code-execution vulnerability.An attacker can exploit this issue to execute arbitrary code in the...
The fundamental challenge of cybersecurity is not new. They have existed as long as computers have been used in sensitive applications in...
Between the last week of January to February, we noticed an increase in hack tool installation attempts that dropped seemingly...
GitHub revealed on Tuesday that last year it paid out $165,000 to researchers who took part in its public bug...
Everyone likes a new Kali update!The big marquee update of this release is the update of Metasploit to version 5.0,...
Governments and private organisations have around 20 minutes to detect and contain a hack from Russian nation-state actors. New statistics...
PrivateVPN Does PrivateVPN keep any logs? The FAQ is emphatic: "No, we NEVER produce logs of any data traffic. The only things...
Locky ransomware is back, again... It's delivered with the help of new tricks to fool users and anti-malware defences. Delivered...