Featured

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were associated with popular platforms:...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11, were made public in August 2019. Five bugs with the general name CDPwn showed up...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries must be one of the most important aspects of any burglary protection and detection system....

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT infrastructure (Operational Technology) were practically impossible, since everything works in a special network, separate from...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting malware that has the functionality of a worm. The analysis showed that Gitpaste-12, as Juniper...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues, prioritizes the most important (such as network security, network integrity, and network performance), and then...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...

Latest news

Advertising of ransomware was banned on the XSS hacker forum

The administration of the popular hacker forum XSS (formerly DaMaGeLab) has banned the advertising and sale of any ransomware...

One of the subgroups of Darkside has hacked the supplier of video surveillance systems

Mandiant experts report that a hack group, which previously worked with the ransomware group DarkSide, hacked the website of an unnamed...

Avaddon malware operators publish data decryption keys

Operators of the ransomware Avaddon stopped working and provided the Bleeping Computer with the keys to decrypt the victims' data. On the...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Worm-like RCE vulnerability found in Microsoft Teams

Oskars Vegeris, a security researcher at Evolution Gaming, discovered...

Ransomware attacks Microsoft SharePoint servers

Microsoft SharePoint servers have joined a long list of...