Security News

North Korea-linked Lazarus Hackers Update Arsenal of Hacking Tools
2018-01-25 15:01

Recent cyberattacks associated with the North Korea-linked Lazarus group have used an evolved backdoor, along with a Remote Controller tool, Trend Micro reports.  read more

ICO protection: Key threats, attack tools and safeguards
2018-01-25 13:00

Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering). On average, over 100 attacks are conducted...

Facebook Releases New Certificate Transparency Tools
2017-12-15 15:32

Following the release of the read more

Android Development Tools Riddled with Nasty Vulnerabilities
2017-12-06 18:15

Java/Android developers are exposed to vulnerabilities affecting the development tools, both downloadable and cloud based, used in the Android application ecosystem, Check Point warns. read more

Critical Flaw in Major Android Tools Targets Developers and Reverse Engineers
2017-12-06 12:03

Finally, here we have a vulnerability that targets Android developers and reverse engineers, instead of app users. Security researchers have discovered an easily-exploitable vulnerability in...

IoT, Android Botnets Emerge as Powerful DDoS Tools: Akamai
2017-11-28 22:17

Distributed denial of service (DDoS) attacks observed during the third quarter employed familiar vectors, but a newcomer that made headlines for abusing Android devices is expected to evolve, a...

Secureworks Releases Open Source IDS Tools
2017-11-20 19:31

Secureworks has released two open source tools, Flowsynth and Dalton, designed to help analysts test rules for intrusion detection systems (IDS) and intrusion prevention systems (IPS) such as...

The tools criminals use to prepare a stolen iPhone for resale
2017-11-14 21:14

Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their legitimate owners via...

Analysis of 3,200 Phishing Kits Sheds Light on Attacker Tools and Techniques
2017-11-02 15:23

Phishing kits are used extensively by cybercriminals to increase the efficiency of stealing user credentials. The basic kit comprises an accurate clone of the target medium's login-in page (Gmail,...

Hamas-Linked 'Gaza Cybergang' Has New Tools, Targets
2017-10-30 16:28

A threat actor believed to be linked to the Palestinian terrorist organization Hamas continues to target organizations in the Middle East and North Africa (MENA) region, and their operations now...