SamSam Ransomware newly evolved with improved sophisticated capabilities and carefully selected the specific organizations such as hospitals, schools, and government sectors those...
Email spoofing is the way of delivering forged emails to recipients.These methods are used by criminals to launch attacks like phishing or...
With the help of in-browser mining services like CoinHive, website owners have an easy way to hijack your CPU cycles and print...
Researchers at the Purdue University and the University of Iowa, USA, have managed to break the key 4G LTE protocols for generation...
Introduction When performing an application assessment one of the areas within an app I pay particular attention to is any ability to...
Telegram Messenger zero day flaw in the version of the desktop telegram encrypted telegram end to the end application that has been...
Security researchers have identified a new in-kind Zyklon malware campaign that spreads advanced botnet malware using at least three newly disclosed vulnerabilities...
Security researchers from Rhino Labs (a US-based cyber-security firm) have found that cyber criminals can use a Microsoft Word feature dubbed subDoc to fool...
Password Managers have been around for quite some time, and most of us rely on them for managing our passwords across several...
Although the original creator of the infamous Mirai IoT botnet was arrested and sent to prison, botnet options are known because of...
Mining cryptocurrencies like mine monero can be a costly investment as they require a monstrous amount of computing power, so hackers have begun...
Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broadcom’s stack, we chose to conduct our...
Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal...
Bashware Technique Can Exploit Windows Subsystem for Linux (WSL) to Hide Malware Making 400 Million Computers Vulnerable. Security firm Checkpoint’s researchers Gal...
New Malware that abuses MS Power point slide show by Exploiting the CVE-2017-0199 (Zero-day remote code execution vulnerability) flow Exists in Windows OLE...
Satellite antenna systems are not spared from vulnerabilities and are quite prone to cyber-attacks, which makes devices and machinery from which these...
Introduction In march 2017, I took part in the pwn2own contest with team Chaitin Security Research Lab. The target I was focused on was...
Pinkslipbot banking Trojan is a banking Trojan that uses a complicated multistage proxy for HTTPS-based control server communication. Security researchers at McAfee Labs...
We have found evidence of much more sophisticated actors leveraging the NSA ETERNALBLUE exploit to infect, install backdoors and exfiltrate user credentials...
Lately I’ve been spending some time fuzzing network-related Linux kernel interfaces with syzkaller. Besides the recently discovered vulnerability in DCCP sockets, I...
One of the more interesting classes of security vulnerabilities are those affecting interoperability technology. This is because these vulnerabilities typically affect any...