Ansible Security Assessment
Introduction Ansible is an open-source software that automates configuration management and software deployment. If you're not familiar with Ansible, we...
Introduction Ansible is an open-source software that automates configuration management and software deployment. If you're not familiar with Ansible, we...
While the Mathway breach in which 25 million email addresses and salted passwords were reportedly stolen didn’t hit the news...
Researchers have uncovered version of the ComRat backdoor, one of the Turla Group’s oldest malware families, that distinguishes itself by...
The Silent Night Zbot, a new variant of the infamous banking trojan ZeuS that wreaked havoc in mid-2009 may be...
A suspected Chinese APT group used a newly discovered modular backdoor to infect at least one video game developer’s build...
The advocacy group Abuse.ch has found a Covid-19-related malspam campaign that impersonates the U.S. Treasury Department and more than likely...
Phishing attacks and stolen credentials have become attackers’ most popular avenues of network compromise, and employee errors are helping pave...
A new malware called “WolfRAT is targeting messaging apps, such as WhatsApp, Facebook Messenger and Line on Thai Android devices. WolfRAT,...
Air-gapped networks aren’t easily compromised, but they don’t offer perfectly air-tight security either. Leveraging insider threats, infecting flash drives and...
Context Quarkslab is one of the 10 ITSEF (Information Technology Security Evaluation Facility, CESTI in French) licensed by the ANSSI's...
MacOS users who think they have protected themselves by downloading a particular two-factor authentication application may have actually infected their...
Introduction Embedded devices are a huge and wide world of options for CPU architectures, operating systems and file systems. You...
Hackers can exploit critical vulnerabilities in PrivateVPN and Betternet – since fixed – to push out fake updates and plant...
An existing version of the Android device screen-locking malware SLocker has apparently been copied and repackaged in the form of...
A long-running malware campaign whose activity dates back to 2016 has been using a sophisticated playbook of tricks to sneak...
We are pleased to announce that we released Triton v0.8 under the terms of the Apache License 2.0 (same license...
A cybergang created a botnet that used SmartTVs to generate fake eyeballs for a massive ad fraud campaign that saw...
Four U.S. federal agencies on Wednesday jointly issued an advisory that warns of ongoing North Korea-sponsored cyberthreat operations, and offers...
A malicious actor is trying to discredit two of the more well-known personalities in cybersecurity circles by including their names...
Malicious actors created a fake webpage that impersonates cybersecurity company Malwarebytes and were using it as a gateway in a...
An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian...
Everyone wants to receive a free $50 Best Buy gift card and USB drive in the mail, but as the...
Businesses remain closed in many major cities around the world as the coronavirus pandemic rages, but cybercriminals are still open...
A coronavirus-themed phishing campaign designed to infect victims with Raccoon information-stealing malware has reportedly been leveraging an open redirect vulnerability...