Irma Past and Future
Introduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5...
Introduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5...
Uzbekistan plans to legalize mining by providing the status of a participant in the mining pool, which is planned to...
The EU (Europian Union) is considering restricting the use of facial recognition technology for a possible duration of 5 years,...
Undoubtedly, being an "Adult Webcam Model" means living a "revealing" life "out in the open". But to an extent where...
Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL.Scallion runs on Mono (tested...
Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup...
Have you ever noticed strange reviews of Google Play apps that look totally out of place? Their creators might give...
The Lazarus group is currently one of the most active and prolific APT actors. In 2018, Kaspersky published a report...
https://github.com/KasperskyLab/hb_dec Every once in a while we get a request that leaves us scratching our heads. With these types of...
After we wrote our private report on the OilRig leak, we decided to scan our archives with our YARA rule,...
All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works...
It seems like every day we read another article about a data breach or leak of cloud storage exposing millions...
Last year, during October and November, 52 hackers were able to hack the US army. "It only strengthens our security...
Researchers at security firm Sophos has discovered a new set of Android apps present on the Google Play Store that...
Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any...
gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using...
On Dec. 17, 2019, a directory traversal vulnerability was announced in the Citrix Application Discovery Controller and Citrix Gateway, which...
Since resuming operations after a holiday hiatus, the malicious actors behind the Emotet banking trojan network have reportedly targeted at...
How do your favorite brands know to use your first name in the subject line of their emails? Why do...
For years, an annual, must-pass federal spending bill has served as a vehicle for minor or contentious provisions that might...
Termination of technical support for Windows 7 and Windows Server 2008 operating systems (OS) can become a serious problem for...
Russian hackers in November 2019 attacked the Ukrainian energy company Burisma in order to gain potentially compromising information about former...
According to a survey of 2,718 executives from across 100 countries, cyber security incidents ranked as the biggest risk to...
A group of cyber security analyst, Intrusion Truth have found their fourth Chinese state-sponsored hacking operation APT 40."APT groups in...