Undetected Linux Backdoor ‘SpeakUp’ infects Linux, MacOS with cryptominers
Security Researchers have discovered a new backdoor trojan, dubbed as ‘SpeakUp’ which exploits known vulnerabilities in six different Linux distributions and has the ability...
Fortnite just fixed a bug that let attackers to fully access user accounts, impersonate...
Yesterday, Epic Games, the developer of Fortnite, an online video game acknowledged the existence of a bug in the game (Fortnite). This bug could...
35-year-old vulnerabilities in SCP client discovered by F-Secure researcher
Yesterday, Harry Sintonen, researcher at F-Secure, discovered 35-year-old vulnerabilities associated with SCP (Secure Copy Protocol) client, a network protocol, that uses Secure Shell (SSH)...
Hyatt Hotels launches public bug bounty program with HackerOne
Hyatt Hotels Corporation launched its bug bounty program with HackerOne, earlier this week. As part of the bug bounty program, ethical hackers are invited...
Using deep learning methods to detect malware in Android Applications
Researchers from the North China Electric Power University have recently published a paper titled, ‘A Review on The Use of Deep Learning in Android...
EU to sponsor bug bounty programs for 14 open source projects from January 2019
Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs for 14 out of...
Privilege escalation: Entry point for malware via program errors
Malware or a malicious software is designed to harm user’s computer systems in multiple ways. Over the years, hackers and attackers have implemented various...
Git-bug: A new distributed bug tracker embedded in git
git-bug is a distributed bug tracker that is embedded in git. Using git's internal storage ensures that no files are added in your project....
Chinese hackers use snail mails to send malware on board government PCs
Recently, Cisco and Huawei had faced a major breach in their routers where attackers used two different bypass methods. Hackers managed to compromise Cisco...
Machine learning based Email-sec-360°surpasses 60 antivirus engines in detecting malicious emails
E-mail is the traditional, primary, and the most vital part of communication within business organizations. They hold minutes of important discussions, confidential documents as...