AlienVault Launches Open Threat Exchange (OTX) 2.0 BetaUnified security management and threat intelligence solutions provider AlienVault today announced a beta version of Open Threat Exchange...
Hi, what are you looking for?
AlienVault Launches Open Threat Exchange (OTX) 2.0 BetaUnified security management and threat intelligence solutions provider AlienVault today announced a beta version of Open Threat Exchange...
High-Tech Bridge has spotted an interesting attack in which the threat actor used what researchers believe is a new vector for delivering malware to...
A 25-year-old individual has been arrested by law enforcement authorities on suspicion of being the developer of Svpeng, an Android Trojan used by cybercriminals...
“Great Cannon” Is the Tool Used by China to Launch DDoS Attacks on GitHub and GreatFire
Facebook has decided not to reward a researcher who has identified a vulnerability in one of the software components used on the official blog...
More than a dozen command and control (C&C) servers used by the Simda botnet were seized last week by law enforcement authorities coordinated by...
Researchers have identified three vulnerabilities in Siemens’ SIMATIC HMI devices. The German engineering giant has started releasing software updates to address the security holes...
In early October 2014, a researcher discovered a serious privilege escalation vulnerability in Apple’s Mac OS X operating system. The flaw, which has been...
Cisco’s Talos research group and Level 3 Communications have joined forces in an effort to disrupt the activities of a malicious actor that has...
The cyberattack conducted by pro-Islamic State hackers against the French TV station TV5Monde appears to have involved a piece of malware known as Kjw0rm,...
Cisco informed customers on Wednesday that it has released software updates to address several high severity vulnerabilities affecting Cisco Adaptive Security Appliance (ASA) products.
Researchers have conducted a detailed analysis of AlienSpy, a Java-based remote access Trojan (RAT) that has been used by malicious actors to target regular...