Malware Analysis

Help stay ahead of Malware attacks by following our Malware Analysis news. Packt Hub will help you keep your software and products safe from vulnerabilities. Check out our news, tutorials and insights.

Intel's Spectre variant 4 patch impacts CPU performance

Intel’s Spectre variant 4 patch impacts CPU performance

0
Intel recently announced their fix for Spectre variant 4 attack that would significantly decrease CPU performance. While working on this fix, Intel anticipated some...
Mozilla Headquarters

Mozilla developers have built BugBug which uses machine learning to triage Firefox bugs

0
Yesterday the team at Mozilla announced that the company is receiving hundreds of bug reports and feature requests from Firefox users on a daily...
The best penetration testing tools for ethical hackers

EU to sponsor bug bounty programs for 14 open source projects from January 2019

0
Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs for 14 out of...
Computer bug, failure or error of software and hardware concept, miniature red ladybug on black computer motherboard PCB with soldering, programmer can debug to search for cause of error.

Researchers prove that Intel SGX and TSX can hide malware from antivirus software

0
Researchers Michael Schwarz, Samuel Weiser, and Daniel Gruss from Graz University of Technology  have published a research paper that demonstrates how the Intel SGX...
NetSpectre attack exploits data from CPU memory

Chinese hackers use snail mails to send malware on board government PCs

0
Recently, Cisco and Huawei had faced a major breach in their routers where attackers used two different bypass methods. Hackers managed to compromise Cisco...

Fortnite just fixed a bug that let attackers to fully access user accounts, impersonate...

0
Yesterday, Epic Games, the developer of Fortnite, an online video game acknowledged the existence of a bug in the game (Fortnite). This bug could...

LastPass patched a security vulnerability from the extensions generated on pop-up windows

0
Last week, the team behind LastPass, a password manager website, released an update to patch a security vulnerability that exposes credentials entered by the...

Google open sources ClusterFuzz, a scalable fuzzing tool

0
Google made its scalable fuzzing tool, called ClusterFuzz available as open source, yesterday. ClusterFuzz is used by Google for fuzzing the Chrome Browser, a...
DefCon 27

At DefCon 27, DARPA’s $10 million voting system could not be hacked by Voting...

0
At the DefCon security conference in Las Vegas, for the last two years, hackers have come to the Voting Village every year to scrutinize...
Linux kernel

Cisco reports critical vulnerabilities in Nexus 9000 data center switches, PI software, and EPN...

0
Earlier this month, Cisco announced a critical vulnerability in its Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software. This vulnerability allows an...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews