New Ransomware Highlights Widespread Adoption of Golang Language By Cyberattackers

A new malicious software (ransomware) variant that leverages Golang has been released. It indicates that cybercriminals leverage GoLang (programming language) to execute their malicious actions. CrowdStrike obtained a specimen of the new ransomware strain, which has not been named yet. This malicious software has the same features as FiveHands and DeathRansom/HelloKitty. These malicious software variants […]

Critical Infrastructure Technology (ICIT) highlights ransomware and RDP access as the current focus

The Institute for Critical Infrastructure Technology (ICIT) points out, in a paper warning of the evolution of what it calls’ disruptionware’ ransomware and the access to RDP as the current focus of a new development which “sees adversaries interrupting business continuity,” posing “an existential threat to key infrastructure operators.” The move from random to targeted […]

Here’s what you can expect at Blackhat USA – Full Highlights and Schedules

Black Hat, the world’s leading producer of information security events, kicks off in USA on August 3-8, 2019 at the Mandalay Bay Convention Center. Black Hat USA will span the very latest information security research, development, and trends. The event will cover everything from critical vulnerabilities found in voting machines, aircrafts, cars, mobile devices, social […]

Google Releases Android Q Beta 2, Bubbles Feature a Highlight

Google has released Android Q Beta 2, which comes with a set of new features. Google announced, on April 3, 2019, the release of the second beta of Android Q, which includes, along with other features, the new Bubbles feature, which would help Android users in multitasking in a better way. Google details this and […]

IBM Researchers Hack Into A Smart Building To Highlight The Backdoors Created For Hackers

This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning that building automation systems used to power so-called “smart buildings” pose a security risk to companies. According to Gartner, devices in smart homes and smart commercial buildings represented 45 percent of total connected […]

Security Expert Highlighting Links between Predominant Website Vulnerabilities and Cyber Warfare

In the Following Issue we will discuss the impacted vulnerability, their particular information and details, proof-of-concept code, as well as their special recommendations, regarding fixing those issues. Security researchers of the High-Profile websites, mostly discover their related vulnerabilities as the highly effective zones. Nicholas Lemonias is an expert researcher, and he is of the belief that such […]