Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.

MITMA’s stands for Man in The Middle Attacks, and is the term used to describe one the oldest but still exceptionally popular forms of attack. In this attack, a hacker…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on 5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.

AbstractEmu, a new Android malware with rooting capabilities

AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware,…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on AbstractEmu, a new Android malware with rooting capabilities

Ranzy Locker ransomware hit tens of US companies in 2021

The FBI published a flash alert to warn of the activity of the Ranzy Locker ransomware that had already compromised tens of US companies. The FBI published a flash alert…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Ranzy Locker ransomware hit tens of US companies in 2021

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X