Malware Analysis

Integer overflow flaw in libssh2 identified

This week, NATIONAL VULNERABILITY DATABASE (NVD) identified an integer overflow flaw in libssh2 before the release of version 1.8.1 which…

5 years ago

Mozilla developers have built BugBug which uses machine learning to triage Firefox bugs

Yesterday the team at Mozilla announced that the company is receiving hundreds of bug reports and feature requests from Firefox…

5 years ago

Microsoft announces: Microsoft Defender ATP for Mac, fully automated DNA data storage, and revived office assistant Clippy

Microsoft made a series of new announcements, earlier this week. These include a new Microsoft Defender ATP for Mac, a…

5 years ago

Researchers prove that Intel SGX and TSX can hide malware from antivirus software

Researchers Michael Schwarz, Samuel Weiser, and Daniel Gruss from Graz University of Technology  have published a research paper that demonstrates…

5 years ago

Google open sources ClusterFuzz, scalable fuzzing tool

Google made its scalable fuzzing tool, called ClusterFuzz available as open source, yesterday. ClusterFuzz is used by Google for fuzzing…

5 years ago

Undetected Linux Backdoor ‘SpeakUp’ infects Linux, MacOS with cryptominers

Security Researchers have discovered a new backdoor trojan, dubbed as ‘SpeakUp’ which exploits known vulnerabilities in six different Linux distributions…

5 years ago

Fortnite just fixed bug that let attackers to fully access user accounts, impersonate real players and buy V-Buck

Yesterday, Epic Games, the developer of Fortnite, an online video game acknowledged the existence of a bug in the game…

5 years ago

35-year-old vulnerabilities in SCP client discovered by F-Secure researcher

Yesterday, Harry Sintonen, researcher at F-Secure, discovered 35-year-old vulnerabilities associated with SCP (Secure Copy Protocol) client, a network protocol, that…

5 years ago

Hyatt Hotels launches public bug bounty program with HackerOne

Hyatt Hotels Corporation launched its bug bounty program with HackerOne, earlier this week. As part of the bug bounty program,…

5 years ago

Using deep learning methods to detect malware in Android Applications

Researchers from the North China Electric Power University have recently published a paper titled, ‘A Review on The Use of…

5 years ago