Security News
A series of cyber-attacks targeting the Middle Eastern region use an encrypted downloader to deliver a Metasploit backdoor, AlienVault reports. read more
A recently discovered remote access Trojan is using a specialized program library that allows operators to interact with the infected machines directly, without an initial “beacon” message, G Data...
A recently discovered backdoor built by the Iron cybercrime group is based on the leaked source code of Remote Control System (RCS), read more
On May 25, 2018, two years after it was adopted by the European Union, the General Data Protection Regulation (GDPR) came into force. For two years companies have been bombarded with offers for...
D-Link's DIR-620 routers contain four recently discovered firmware flaws that an attacker could use to take over a network, and D-Link has no plans to fix them.
The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim's system, in order to drop additional payloads later.
A recently detected PowerShell backdoor can steal information and execute various commands on the infected machines. read more
'Secure Data Act' Tries to End Long-Running Encryption StandoffA bipartisan group of U.S. lawmakers has reintroduced legislation in the House that would stop the government from forcing software...
The Secure Data Act has returned and is lookin' for love US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the US...
Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints Ozzie's proposal as something...