Search
Monday 23 October 2017
  • :
  • :

Archives post

6.3 Connected Devices, 2.4 People and 0.3 Pets per Home in the New “Household 2.0” Era

The make-up of the modern home is changing, bringing with it a new era of “household 2.0” which, on average, cares for 2.4 people[i],...

New Atos paper outlines major advances in cyber security

Atos, a global leader in digital transformation, believes waiting for digital threats to materialise will soon be consigned to history as...

Woefully Inadequate IT Processes for Managing User Accounts and Access Continue to Create Major Security and Compliance Risks, One Identity Survey Reveals

Global study indicates disgruntled former employees or other threat actors still have widespread opportunity to cause harm because their IT...

Enterprises Blacklist iOS Apps Due to Data Leakage: Report

A report published on Tuesday by mobile security firm Appthority reveals which Android and iOS applications are most frequently blacklisted...

Researchers Link CCleaner Attack to State-sponsored Chinese Hackers

The sophisticated supply chain attack that resulted in millions of users downloading a backdoored version of the popular CCleaner...

massExpConsole: adding more exploits and tools

massExploitConsole a collection of tools with a cli ui disclaimer Please use this tool only on authorized systems, I’m not responsible...

Analysis of Malicious Documents-Part 3

In the last part of the article series, we have seen some handy options of OfficeMalScanner like debug, scan, brute, etc.; learned about...

Analysis of Malicious Documents-Part 2

In the previous part of this article series, we have seen some basics and initial concepts around analyzing Malicious files. In this part...

Analysis of Malicious Documents-Part 1

Spreading of malware through malicious documents is not new but considering how malware authors use different techniques has become...

Chinese Bitcoin Trading Exchange Blames User For Losing $3M

Popular Chinese Bitcoin Trading Exchange Denies Hacking Rumors And Blames Customer For Poor Security. Phishing scams against digital...

Physical Penetration Attacks

Putting yourself or a member of your team inside the target organization during a penetration test can be an expeditious way to access the...

It’s 3 Billion! Yes, Every Single Yahoo Account Was Hacked In 2013 Data Breach

The largest known hack of user data in the history just got tripled in size. Yahoo, the internet company that’s acquired by Verizon...

EtherParty Breach: Another Ethereum ICO Gets Hacked

Etherparty announced Sunday that its ICO (Initial Coin Offering) website selling tokens for a blockchain-based smart contract tool was...

Κυβερνοεπιθέσεις εναντίον της Βόρειας Κορέας εξαπέλυσαν οι ΗΠΑ

                  Σύμφωνα με την Washington Post, ο πρόεδρος των...