Author Description

stevinv

Author Posts

Experts analyzed the distribution technique used in a recent Emotet campaign

ESET analyzed the distribution technique used by cyber criminals in new Emotet campaign that has recently affected…

Facebook tracks non-users via Android Apps

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According…

Hackers bypassed vein based authentication with a fake hand

A couple of researchers demonstrated how to bypass vein based authentication using a fake hand build from…

Hackers target financial firms hosting malicious payloads on Google Cloud Storage

Researchers at Menlo Labs uncovered a malicious email campaign targeting employees of banks and financial services companies…

Hackers launched phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale

Amnesty International warns of threat actors that are launching phishing attacks aimed at bypassing Gmail, Yahoo 2FA…

Researcher disclosed a Windows zero-day for the third time in a few months

Security researcher SandboxEscaper released a working proof-of-concept (PoC) exploit for a new Windows zero-day vulnerability. Hacker Discloses…

Russia-linked Sofacy APT developed a new ‘Go’ variant of Zebrocy tool

Researchers at Palo Alto Networks discovered that the Russian-linked Sofacy APT has written a new version of their…

Germany’ BSI chief says ‘No Evidence’ of Huawei spying

The head of Germany’s BSI admitted that since now there is no proof espionage activity conducted through…

Twitter fixed a bug that could have exposed Direct Messages to third-party apps

Researcher Terence Eden discovered that the permissions dialog when authorizing certain apps to Twitter could expose direct messages to…

Show Buttons
Hide Buttons