Home Security Malware Analysis

Malware Analysis

Help stay ahead of Malware attacks by following our Malware Analysis news. Packt Hub will help you keep your software and products safe from vulnerabilities. Check out our news, tutorials and insights.

What you need to know about VPNFilter Malware Attack

0
Have you heard about the latest VPNFilter Malware attack? In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...
Why Wall Street unfriended Facebook: FB lost over $120 billion in market value overnight after Q2 earnings call

Phish for Facebook passwords with DNS manipulation [Tutorial]

0
Password Phishing can result in huge loss of identity and user's confidential details. This could result in financial losses for users and can also...
Kubernetes security

Machine learning based Email-sec-360°surpasses 60 antivirus engines in detecting malicious emails

0
E-mail is the traditional, primary, and the most vital part of communication within business organizations. They hold minutes of important discussions, confidential documents as...
NetSpectre attack exploits data from CPU memory

Chinese hackers use snail mails to send malware on board government PCs

0
Recently, Cisco and Huawei had faced a major breach in their routers where attackers used two different bypass methods. Hackers managed to compromise Cisco...

Git-bug: A new distributed bug tracker embedded in git

0
git-bug is a distributed bug tracker that is embedded in git. Using git's internal storage ensures that no files are added in your project....
AI attack

Privilege escalation: Entry point for malware via program errors

0
Malware or a malicious software is designed to harm user’s computer systems in multiple ways. Over the years, hackers and attackers have implemented various...
The best penetration testing tools for ethical hackers

EU to sponsor bug bounty programs for 14 open source projects from January 2019

0
Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs for 14 out of...
AI attack

Using deep learning methods to detect malware in Android Applications

0
Researchers from the North China Electric Power University have recently published a paper titled, ‘A Review on The Use of Deep Learning in Android...
Computer bug, failure or error of software and hardware concept, miniature red ladybug on black computer motherboard PCB with soldering, programmer can debug to search for cause of error.

Hyatt Hotels launches public bug bounty program with HackerOne

0
Hyatt Hotels Corporation launched its bug bounty program with HackerOne, earlier this week. As part of the bug bounty program, ethical hackers are invited...
Packt and Humble Bundle come together for cybersecurity bundle

35-year-old vulnerabilities in SCP client discovered by F-Secure researcher

0
Yesterday, Harry Sintonen, researcher at F-Secure, discovered 35-year-old vulnerabilities associated with SCP (Secure Copy Protocol) client, a network protocol, that uses Secure Shell (SSH)...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews