Microsoft Asks Researchers To “Do Their Worst,” Doubles Azure Bounty To $40,000

At the ongoing Black Hat USA 2019 conference, Microsoft announced the Azure Security Lab ‚ a sandbox-like environment for security researchers to test Azure security without putting the company’s customers at risk. The new Azure Cloud host testing environment will allow security researchers to test attacks on infrastructure-as-a-service (IaaS) scenarios without affecting users. With isolated […]

Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords

The same team of cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as Dragonblood, in the newly launched WPA3 WiFi security standard few months ago has now uncovered two more flaws that could allow attackers to hack WiFi passwords. WPA, or WiFi Protected Access, is a WiFi security standard that has been designed to […]

Researchers Are Using $10 Raspberry Pi Zero For ‘Cheap Encryption’ In Space

There are several techniques of encryption that are deployed to secure communication protocols and devices but these techniques aren’t effective if you want to secure a satellite or spacecraft in space. Encryption in space is a tad different than how it is deployed on Earth. One of the reasons why encryption in space is challenging […]

Researchers Re-identify 99.98% People In ‘Anonymized’ Dataset

Various companies collect data from our devices almost all the time. While there is always a privacy concern in the picture, they try to assure that our data is in completely safe hands. Also, if it gets shared with third-parties, all the information that could be used to identify people is redacted and de-identified. Turns […]

Researchers Build Transistor-Like ‘Quantum Gates’ Using Qudits

Quantum computing is a promising field but not much progress has been made until now. The reason behind this is the unstable nature of qubits – the basic unit of quantum computing. To overcome this bottleneck, researchers from Purdue University have built a transistor-like gate or a quantum version of a transistor using Qudits. While […]

Most Important Security Tools and Resources For Security Researcher and Malware Analyst

Security Professionals always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Hex Editors HxD 010 Editor Hex Workshop HexFiend Hiew Also Enroll:  Complete Ethical Hacking and Penetration Testing Course – Become a Professional Ethical Hacker Disassemblers IDA Pro Binary Ninja Radare Hopper Capstone objdump fREedom plasma Detection and […]

Deepfake AI: Researchers Have Finally Found A ‘Good’ Way To Use It

Deepfakes have gained a lot of negative attention recently. Be it the hugely criticized DeepNude AI app which removes clothing from pictures of women or the FakeApp that swaps the faces of celebrities with porn stars in videos. But the AI technology behind deepfakes and deepnudes isn’t entirely evil. Deep-learning algorithms are excellent at detecting […]

Google Researcher Finds Nasty iMessage Bug That ‘Bricks’ iPhone

Time and again, we have seen that sending a string of particular characters in iMessage can lead to strange things on an iPhone. There are different character combinations that can render an iPhone useless. While Apple has been quick to fix such bugs, this time a Google researcher found a nasty one that “bricks” Apple […]

Researchers exploit LTE flaws to send 50,000 fake presidential alerts

Researchers managed to cover a 50,000 seat football stadium using only four malicious portable stations. A group of security researchers from the University of Colorado Boulder has published a paper detailing the findings of their latest research revealing that LTE vulnerabilities can help attackers send out fake presidential alerts. To do this, they only need […]

Netflix Researchers Just Fixed 4 Severe Linux And FreeBSD Vulnerabilities

Movies and TV shows pop up in our minds when we say the word Netflix. But it turns out the company wants to do a lot more than just entertain its users. Netflix researchers found four critical vulnerabilities that affect different versions of Linux and FreeBSD kernels deployed in systems worldwide. As explained in the […]

AI Techs Of Facebook, Microsoft, And Google Prefer “Rich People”: Research

Object recognition is a computer vision (CV) technique using which computers can recognize objects, such as items in our common households. Now many companies have developed their own systems which are becoming better over time. The closest object recognition tech you can find is right on your phone, Google Lens. Facebook uses the technique to […]

Researcher publishes macOS Gatekeeper bypass vulnerability

Security researcher Filippo Cavallarin recently discovered a security vulnerability on macOS 10.14.5 that can ignore the first barrier of the system security Gatekeeper to run unsafe applications directly, and thus obtain the system’s shell permissions. Gatekeeper is a key defensive measure in the Mac App Store. When your app is not securely signed, the system […]

Researchers Have Invented The World’s First Unhackable Processor

Meet MORPHEUS  — a new computer architecture developed by researchers from the University of Michigan that is claimed to be ‘unhackable’ because of its advanced self fending techniques. The chip uses self-encryption technology and reshuffles its own code and data at 20 times per second. This speed is faster than a human hacker can work […]

Researchers have developed a new technology to identify malware

Researchers at North Carolina State University and the University of Texas at Austin have developed a new technology to detect malware. The new technology enables detection by tracking power fluctuations in embedded systems. Embedded systems include a wide range of applications, such as home voice assistants, industrial control systems, and more. Malware against these systems […]

Biodegradable Plastic Is As Bad As Conventional Plastic: Research

Biodegradable plastic bags can survive up to 3 years in soil and water, according to a study. Biodegradable bags used in the experiment were able to carry groceries and other heavy items similar to a new plastic bag. By design, biodegradable plastic should be environmentally friendly and finish itself off after a certain amount of […]

Researchers Find 36 security vulnerabilities in LTE standard

Each new research conducted by experts from the best ethical hacking Institute and specialists from the International Institute of Cyber Security (IICS) shows new security flaws in communication standards such as LTE, used for high-speed data transmission. On this occasion, the investigation has thrown 36 new vulnerabilities in LTE that, if exploited, would allow a […]

Elements Of A Well Researched Phishing Attempt

Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is a huge business by cybercriminals. There is money to be earned by collecting personally identifiable information, either sell them to 3rd parties or use it for extortion and blackmail, especially if the victims […]

Elements Of A Well Researched Phishing Email Attempt

Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is a huge business by cybercriminals. There is money to be earned by collecting personally identifiable information, either sell them to 3rd parties or use it for extortion and blackmail, especially if the victims […]

Operation Sharpshooter – Researchers Linked the Global Campaign to Lazarus Hacker Group

Security researchers from McAfee linked the global campaign dubbed Operation Sharpshooter to the infamous Lazarus Hacker Group. Sharpshooter campaign targets primarily on financial services, government, and critical infrastructure. The campaign was first identified in 2018, but according to the new analysis report, the campaign started as early as September 2017. Attackers targets broader set of […]

Researchers Link ‘Sharpshooter’ Cyber Attacks to North Korean Hackers

Security researchers have finally, with “high confidence,” linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT hacking group. Thanks to the new evidence collected by researchers after analyzing a command-and-control (C2) server involved in the espionage campaign and seized by law enforcement. Dubbed Operation Sharpshooter, […]