Intel and Cybereason have partnered to build anti-ransomware defenses into the chipmaker’s newly announced 11th generation Core vPro business-class processors. The hardware-based...
With the popularity of web front-end packaging tools, have you encountered more and more websites represented by Webpack packager in daily...
Researchers uncovered a new Malvertising campaign PowerPepper from DeathStalker threat actor group that is active since 2012, and actively attacking various organizations...
webscan is a browser-based network IP scanner and local IP detector. It detects IPs bound to the user/victim by listening on...
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that...
Alien Vault is an open source information security and event management tool for real-time Thread Detection. Alien Vault tool is used in...
Introduction to E-commerce fraud prevention tools Today the E-Commerce industry is on the rise. With the unfortunate situation with the COVID-19 pandemic,...
Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and tools that...
Specialists from a cyber security consulting company reported the finding of a vulnerability in the .NET Core library that would allow threat...
A Chinese based Naikon APT group discovered attacking several national government entities in the Asia Pacific (APAC) region. The ongoing cyber-espionage campaign...
The IT security researchers at Cyble have identified hackers who have allegedly hacked Huiying Medical, a Chinese company with a worldwide presence....
2019 was a record year for cybercrime. Hackers exposed over 4 billion records for a total worldwide cost of $600 billion in...
A prolific phishing kit distribution network dubbed “16Shop” believed to be active since 2018 and developed by a hacking group called the...
This malware disables Google’s only security mechanism against malware-infected apps on the Play Store. While the Android and iOS fanbase can be...
Researchers discovered a new evasion technique used by attackers in client-side web skimmer to bypass their conceal their fraudulent activity. Recently, a...
Researchers observed a new tool attributed to the FIN7 hacker group dubbed BIOLOAD aimed to minimize the footprint in the victim machine...
Cyberespionage group known as BlackTech who behind the Waterbear malware campaign that has been targeted at various industries several years return to...
The Snatch Ransomware was first identified in the year 2018 and now it adopts a new technique that involves forcing the windows...
Attack Monitor is Python application written to enhance security monitoring capabilites of Windows 7/2008 (and all later versions) workstations/servers and to automate...
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from...
DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing. PurposeThis lab has been designed...