Application Security
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were associated with popular platforms:...
Articles
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11, were made public in August 2019. Five bugs with the general name CDPwn showed up...
Articles
Why Is It Important To Have Intrusion Detection And Prevention ?
This article describes why detection and prevention of burglaries must be one of the most important aspects of any burglary protection and detection system....
Cyber Security
The risk is real: attacks on OT infrastructure
Previously, many believed that attacks on an isolated OT infrastructure (Operational Technology) were practically impossible, since everything works in a special network, separate from...
Articles
Gitpaste-12: Linux bot armed with a dozen exploits
Researchers at Juniper Networks have discovered a Linux scripting malware that has the functionality of a worm. The analysis showed that Gitpaste-12, as Juniper...
Tutorial and Tools
Saferwall : Open Source Malware Analysis
Saferwall is an open source malware analysis platform. It aims for the following goals:
Provide a collaborative platform to share samples among malware researchers.Acts as...
Articles
Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !
Network vulnerability assessment analyzes a variety of network issues, prioritizes the most important (such as network security, network integrity, and network performance), and then...
Artificial Intelligence
Artificial Intelligence and Cyber Security
As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...
Latest news
50% reduction in Google account hacks after enabling 2SV
One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures.
It...
Dangerous vulnerability has been discovered in the latest version of the OpenSSL library
The vulnerability was discovered in the latest version of OpenSSL 3.0.4 , which was released on June 21, 2022 and affects...
Chrome 103 fixes 14 vulnerabilities
This week, Google developers released a stable version of Chrome 103 , which fixed 14 vulnerabilities. Independent researchers who uncovered some of...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Hackers who hacked cybersecurity companies are back again after five years
As part of Operation #LeakTheAnalyst, hackers allegedly hacked into...
Check Point Detects Ransomware Spike on Healthcare Facilities Around the World
Trickbot and Emotet Trojans, Leading the Global Threat Index,...
Microsoft Azure open to New Vulnerabilities
Two brand new vulnerabilities related to Microsoft Azure have...