The European Parliament has set up a revised list does not require that the encryption of a party to a party when...
For the first time, a hardware backdoor tool is presented having several advanced features, such as: remote control via SMS commands, automated...
Hikvision, a Chinese manufacturer of video surveillance equipment, recently patched a backdoor in a slew of its cameras that could have made...
Real-time full-blown snooping with breakable encryption. The UK government has secretly drawn up more details of its new bulk surveillance powers –...
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or...
Mobile applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the...
An unknown security researcher has published details on a vulnerability named “Antbleed,” which the author claims is a remote backdoor affecting Bitcoin...
Microsoft dismisses DoublePulsar infection estimates, but otherwise remains silent. After Microsoft officials dismissed evidence that more than 10,000 Windows machines on the...
One week ago today, the Shadow Brokers (an unknown hacking entity) leaked the Equation Group’s (NSA) FuzzBunch software, an exploitation framework similar...
Did script kiddies use DoublePulsar code released by NSA-leaking Shadow Brokers? Security experts believe that tens of thousands of Windows computers may...
[jpshare] A Recent Mass Scan Revealed That More than 30000 Windows Machine Infected by National Security Agency Backdoor DOUBLEPULSAR .DOUBLEPULSAR one of the NSA...
Embedding a shortcut (.lnk file) which points to powershell (accompanied by an encoded command) in a word document or zip file is...
The Turla espionage group has been targeting various institutions for many years. Recently, ESET found several new versions of Carbon.
APT29, a/k/a Cozy Bear, has been utilizing a technique called domain fronting in order to secure backdoor access to targets for nearly two...
PUP(potentially unwanted program) packages that install’s along with Chinese software’s consist of backdoors targeting English speakers. The backdoor was uncovered by Malware...
A driver secretly installed via PUPs packages for Chinese software contain backdoors enabling a third-party to load unsigned drivers or to execute...
A python based backdoor which uses Telegram as C&C server. Setup Telegram setup: Install Telegram app and search for “BOTFATHER”. Type /help...
In another classic example of why you shouldn’t leaving your work laptop in the car, national security may have been compromised. An...
Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The...
On Valentine’s Day, Mac users got a special “treat” in the form of new malware. Then, later that same week, there were signs of...
Transferring Backdoor Payloads by DNS AAAA records and IPv6 Address. in this article i want to explain how can use IPv6 Address (AAAA)...