VPNFilter EXIF to C2 mechanism analysed

On May 23 2018, our colleagues from Cisco Talos published their excellent analysis of VPNFilter, an IoT / router malware which exhibits some worrying characteristics. Some of the things which...

James Comey: FBI Faces Deep Tech-Related Questions | Threatpost

LAS VEGAS – The American law enforcement system is facing a crisis of identity in the face of technology advancement, with cloud migration and automated systems, data privacy and encryption...

The Pirate Bay(TPB) will be blocked by Sweden ISP Telenor

The Pirate bay (TPB), a Most Popular File sharing torrent website is going to be blocked by the Sweden ISP Telenor which has continually fought against the site-blocking in Sweden. Finally, it...

Russia, hacking, cyberattacks | Homeland Security Newswire

The Russia connectionU.S. disrupted major Russian cyberattack, possibly on UkraineThe U.S. Justice Department has seized an Internet domain controlled by a hacking group tied to Russian military intelligence that was...

3 Charged In Fatal Kansas ‘Swatting’ Attack — Krebs on Security

Federal prosecutors have charged three men with carrying out a deadly hoax known as “swatting,” in which perpetrators call or message a target’s local 911 operators claiming a...

Testing of Uber’s Self-Driving Car Crashes to a Halt

In the aftermath of a fatal crash that killed a pedestrian, the state of Arizona barred Uber Technologies, Inc. from road-testing its self-driving car program. Now, the company announced on...

Android Application Penetration Testing – Part 1

Android security testing is more often used by security industries to test the vulnerabilities in Android applications. After web applications, more concern area is mobile application penetration test Let’s start...

Xenotime, Threat actors Behind Triton Malware broadens its activitiesSecurity Affairs

The threat actor behind the Triton malware (aka Trisis, Xenotime, and HatMan) is now targeting organizations worldwide and safety systems. The attackers are expanding their targets and...

Vulnerabilities in D-Link Routers Allows Hackers Gain Complete Control

Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default credentials to gain high privileged access to the firmware. D-Link routers are one...

LATEST NEWS

MUST READ