What you need to know about VPNFilter Malware Attack
Have you heard about the latest VPNFilter Malware attack?
In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...
Phish for Facebook passwords with DNS manipulation [Tutorial]
Password Phishing can result in huge loss of identity and user's confidential details. This could result in financial losses for users and can also...
Machine learning based Email-sec-360°surpasses 60 antivirus engines in detecting malicious emails
E-mail is the traditional, primary, and the most vital part of communication within business organizations. They hold minutes of important discussions, confidential documents as...
Chinese hackers use snail mails to send malware on board government PCs
Recently, Cisco and Huawei had faced a major breach in their routers where attackers used two different bypass methods. Hackers managed to compromise Cisco...
Git-bug: A new distributed bug tracker embedded in git
git-bug is a distributed bug tracker that is embedded in git. Using git's internal storage ensures that no files are added in your project....
Privilege escalation: Entry point for malware via program errors
Malware or a malicious software is designed to harm user’s computer systems in multiple ways. Over the years, hackers and attackers have implemented various...
EU to sponsor bug bounty programs for 14 open source projects from January 2019
Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs for 14 out of...
Using deep learning methods to detect malware in Android Applications
Researchers from the North China Electric Power University have recently published a paper titled, ‘A Review on The Use of Deep Learning in Android...
Hyatt Hotels launches public bug bounty program with HackerOne
Hyatt Hotels Corporation launched its bug bounty program with HackerOne, earlier this week. As part of the bug bounty program, ethical hackers are invited...
35-year-old vulnerabilities in SCP client discovered by F-Secure researcher
Yesterday, Harry Sintonen, researcher at F-Secure, discovered 35-year-old vulnerabilities associated with SCP (Secure Copy Protocol) client, a network protocol, that uses Secure Shell (SSH)...