Malware Analysis

Help stay ahead of Malware attacks by following our Malware Analysis news. Packt Hub will help you keep your software and products safe from vulnerabilities. Check out our news, tutorials and insights.

Undetected Linux Backdoor ‘SpeakUp’ infects Linux, MacOS with cryptominers

0
Security Researchers have discovered a new backdoor trojan, dubbed as ‘SpeakUp’ which exploits known vulnerabilities in six different Linux distributions and has the ability...

Fortnite just fixed a bug that let attackers to fully access user accounts, impersonate...

0
Yesterday, Epic Games, the developer of Fortnite, an online video game acknowledged the existence of a bug in the game (Fortnite). This bug could...
Packt and Humble Bundle come together for cybersecurity bundle

35-year-old vulnerabilities in SCP client discovered by F-Secure researcher

0
Yesterday, Harry Sintonen, researcher at F-Secure, discovered 35-year-old vulnerabilities associated with SCP (Secure Copy Protocol) client, a network protocol, that uses Secure Shell (SSH)...
Computer bug, failure or error of software and hardware concept, miniature red ladybug on black computer motherboard PCB with soldering, programmer can debug to search for cause of error.

Hyatt Hotels launches public bug bounty program with HackerOne

0
Hyatt Hotels Corporation launched its bug bounty program with HackerOne, earlier this week. As part of the bug bounty program, ethical hackers are invited...
AI attack

Using deep learning methods to detect malware in Android Applications

0
Researchers from the North China Electric Power University have recently published a paper titled, ‘A Review on The Use of Deep Learning in Android...
The best penetration testing tools for ethical hackers

EU to sponsor bug bounty programs for 14 open source projects from January 2019

0
Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs for 14 out of...
AI attack

Privilege escalation: Entry point for malware via program errors

0
Malware or a malicious software is designed to harm user’s computer systems in multiple ways. Over the years, hackers and attackers have implemented various...

Git-bug: A new distributed bug tracker embedded in git

0
git-bug is a distributed bug tracker that is embedded in git. Using git's internal storage ensures that no files are added in your project....
NetSpectre attack exploits data from CPU memory

Chinese hackers use snail mails to send malware on board government PCs

0
Recently, Cisco and Huawei had faced a major breach in their routers where attackers used two different bypass methods. Hackers managed to compromise Cisco...
Kubernetes security

Machine learning based Email-sec-360°surpasses 60 antivirus engines in detecting malicious emails

0
E-mail is the traditional, primary, and the most vital part of communication within business organizations. They hold minutes of important discussions, confidential documents as...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews