OilRig’s Poison Frog – old samples, same trick
After we wrote our private report on the OilRig leak, we decided to scan our archives with our YARA rule,...
After we wrote our private report on the OilRig leak, we decided to scan our archives with our YARA rule,...
All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works...
iRobot’s line of Roomba robot vacuums is impressive. It provides you with a high-quality unit and superior functionality. But which...
A lot of people thought that it would take some time before iRobot could come out with a robot vacuum...
Two of the most well-known brands in the robot vacuum space are iRobot Roomba and Ecovacs Deebot. How are the...
As smart home technology continues to become a larger part of our lives, more and more homes are discovering the...
The Roomba e5 was introduced by iRobot at the IFA 2018 along with the Roomba i7+. But while the Roomba...
It seems like every day we read another article about a data breach or leak of cloud storage exposing millions...
Last year, during October and November, 52 hackers were able to hack the US army. "It only strengthens our security...
Researchers at security firm Sophos has discovered a new set of Android apps present on the Google Play Store that...
Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any...
gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using...
On Dec. 17, 2019, a directory traversal vulnerability was announced in the Citrix Application Discovery Controller and Citrix Gateway, which...
Since resuming operations after a holiday hiatus, the malicious actors behind the Emotet banking trojan network have reportedly targeted at...
How do your favorite brands know to use your first name in the subject line of their emails? Why do...
For years, an annual, must-pass federal spending bill has served as a vehicle for minor or contentious provisions that might...
Termination of technical support for Windows 7 and Windows Server 2008 operating systems (OS) can become a serious problem for...
Russian hackers in November 2019 attacked the Ukrainian energy company Burisma in order to gain potentially compromising information about former...
According to a survey of 2,718 executives from across 100 countries, cyber security incidents ranked as the biggest risk to...
A group of cyber security analyst, Intrusion Truth have found their fourth Chinese state-sponsored hacking operation APT 40."APT groups in...
A crypto-mining exploit attack, has as of late been discovered in Windows 7 , the ex-operating system which ceased to...
Python library to remotely extract credentials. This blog post explains how it works.You can check the wikiThis library uses impacket...
LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and...
What is the CryptoAPI Spoofing Vulnerability? Who is impacted?A flaw (CVE-2020-0601) has recently been found in the way the Microsoft...