Most recent articles by:

Koohyar Biniyaz (Jimmy)

Hacker Who Stole Personal Data for 100$ Million Teceived 8 years in Prison

Alexander Brovko, 36, received a sentence for stealing personal data and financial information worth a total of more than $ 100 million. According to...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting malware that has the functionality of a worm. The analysis showed that Gitpaste-12, as Juniper...

Tripoli; New Ransomware In the wild

This crypto ransomware encrypts user data with AES + RSA and then demands a 0.1 BTC ransom to get the files back. Original title:...

IoT Security – Why is it Important?

IoT or Internet of Things are connected devices, including hardware, software and data. IoT Security It is a technology area that deals with the...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

Threat Intelligence Automation

Cyber Threat Intelligence (CTI) is a framework and technology that generates intelligence that can, or will respond to cyber threat attacks that are now...

OWASP – Open Web Application Security Project

The Open Web Application Security Project (OWASP) has compiled a list of the 10 largest web security vulnerabilities in the world's most popular web...

Why Companies Should Care More About Credential Breach?

Phishing attacks and stolen credentials are becoming more common in the world of data security, and employee errors are helping to pave the way,...