Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered...
Cyber-espionage group targeted companies in Asia. Details about the operations of a new cyber-espionage group are emerging, and this gang has been buying...
FBI director James Comey called on tech companies to create backdoor access to their users’ data on Wednesday, arguing it was necessary...
A new analysis of the Sofacy APT gang, a Russian-speaking group carrying out targeted attacks against military and government offices for close...
The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month,...
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First...
Blackberry is all set to shut down its operations in Pakistan. The statement came from the company after continuing request from the...
Brazilian whacks Arris for easy-t-o-guess default password, fix promised fast. Security bod Bernardo Rodrigues has found a backdoor-within-a-backdoor affecting some 600,000 Arris...
We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI...
A software development kit that has been provided by Baidu (A Chinese search engine) can easily be exploited for installing backdoors on...
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it...
Short Bytes: Baidu, the Chinese analogous to Google has distributed a software development kit (SDK), Moplus, which has reportedly made over 100...
Short Bytes: Crypto backdoor entry isn’t the only way for the cops to access your data. You think your iPhone is the...
The privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly...
Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness...
Matt Graeber showed the method on performing WMI attacks and its effects, but he didn’t talk much about the details. Therefore, this...
Dozens of successful attacks detected that install malicious code on company portals. Attackers are infecting a widely used virtual private network product...
More than a dozen routers in four countries infected with fully featured implants. Researchers have uncovered active and highly clandestine attacks that...
Microsoft has taken NATO onboard in its program which presents information about vulnerabilities and provides access to source code. A Security Agreement...
It has always been believed that Cisco routers being used in the enterprise environment could be hacked via installation of backdoor firmware,...
Hackers linked to known North Korean attack points and methods exploited a zero-day vulnerability in the Hangul Word Processor (HWP), widely deployed...