Malware Analysis

EU to sponsor bug bounty programs for 14 open source projects from January 2019

Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs…

5 years ago

Privilege escalation: Entry point for malware via program errors

Malware or a malicious software is designed to harm user’s computer systems in multiple ways. Over the years, hackers and…

6 years ago

Git-bug: A new distributed bug tracker embedded in git

git-bug is a distributed bug tracker that is embedded in git. Using git's internal storage ensures that no files are…

6 years ago

Chinese hackers use snail mails to send malware on board government PCs

Recently, Cisco and Huawei had faced a major breach in their routers where attackers used two different bypass methods. Hackers…

6 years ago

Machine learning based Email-sec-360°surpasses 60 antivirus engines in detecting malicious emails

E-mail is the traditional, primary, and the most vital part of communication within business organizations. They hold minutes of important…

6 years ago

What you need to know about VPNFilter Malware Attack

Have you heard about the latest VPNFilter Malware attack? In brief, the software networking firm and its network analysis department…

6 years ago

The 10 most common types of DoS attacks you need to know

There are businesses that are highly dependent on their services hosted online. It's important that their servers are up and…

6 years ago

Intel’s Spectre variant 4 patch impacts CPU performance

Intel recently announced their fix for Spectre variant 4 attack that would significantly decrease CPU performance. While working on this…

6 years ago

12 common malware types you should know

A malware is a software with malicious intent that changes the system without the knowledge of the user. A malware uses…

6 years ago