News

Malicious Apps in Global App Stores Decrease 37 Percent, Feral Apps Lose Ground to Third-Party Stores, RiskIQ’s Q4 Mobile Threat Landscape Report Finds

Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in…

Hackers tried to cause a blast at a Saudi petrochemical plant

Hackers tried to cause a blast at a Saudi petrochemical plant A new cyber attack against a Saudi…

A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit

Some people are very afraid of an artificially intelligent future where vicious robots become attack dogs and…

MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers

MOSQUITO is new technique devised by a team of researchers at Israel’s Ben Gurion University, led by the…

Drive-by as a service: BlackTDS

Overview Proofpoint researchers have been tracking a new Traffic Distribution System called BlackTDS implicated in the distribution…

The 2018 Guide to Finding a Secure File Transfer Solution

It’s no secret—file transfers are an integral part of how each business runs. From purchase orders and…

Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang

Ukrainian Police supported by security firm Group-IB and other security firms dismantled a DDoS crime gang that…

Cryptocurrency Mining Operations Now Targeting Servers

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server,…

77 FACTS ABOUT CYBER CRIMES ONE SHOULD KNOW IN 2018

As a society, we cherish our right to privacy probably more than anything else. Sharing is great,…

The Risks of Crypto-currency Mining Infections

During 2017, the crypto-currency market grew nearly 20-fold, reportedly increasing from approximately $18 billion to more than $600 billion…

Show Buttons
Hide Buttons