These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields. As cyberattacks become more sophisticated and network complexity increases, there are...
Read moreBulgarian Tax Breach Nets All the Records
July 21 2019An attack by a ‘wizard hacker’ results in leaked records for virtually every Bulgarian taxpayer. A hacker hit Bulgaria’s NRA tax agency and gained access to the tax records...
Read moreBulgarian Tax Breach Nets All the Records
July 21 2019An attack by a ‘wizard hacker’ results in leaked records for virtually every Bulgarian taxpayer. A hacker hit Bulgaria’s NRA tax agency and gained access to the tax records...
Read moreThreat actors are increasingly ‘living off the land,’ using publicly available management and administration tools to conceal malicious activity. Image Source: Shutterstock Cybercriminals have long used legitimate management and...
Read moreThreat actors are increasingly ‘living off the land,’ using publicly available management and administration tools to conceal malicious activity. Image Source: Shutterstock Cybercriminals have long used legitimate management and...
Read moreOpen Source Hacking Tool Grows Up
July 21 2019Koadic toolkit gets upgrades – and a little love from nation-state hackers. An open source white-hat hacking tool that nation-state hacking teams out of China, Iran, and Russia have...
Read moreOpen Source Hacking Tool Grows Up
July 21 2019Koadic toolkit gets upgrades – and a little love from nation-state hackers. An open source white-hat hacking tool that nation-state hacking teams out of China, Iran, and Russia have...
Read moreGet the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference. Cybersecurity professionals, take note: There’s an...
Read moreGet the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference. Cybersecurity professionals, take note: There’s an...
Read moreMirai Groups Target Business IoT Devices
July 20 2019More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business. The groups...
Read more
Recent Comments