Latest Entries »

The Esile targeted attack campaign targeting various countries in the Southeast Asian region has been discussed in the media recently. This campaign – which was referred to by other researchers as Lotus Blossom – is believed to be the work of a nation-state actor due to the nature of the stolen information, which is more valuable to countries than either private companies or cybercriminals. View full article »

A Wisconsin company is about to become the first in the U.S. to offer microchip implants to its employees. Yes, you read that right. Microchip implants. View full article »

Surveillance malware dubbed Fruitfly was easy to spot but flew under the radar anyway.

View full article »

Stock Photography.  Maria Ågren, former Director General of the Transport Agency.

Sensitive information from the Transport Agency has been made available to non-security personnel abroad. It is about the entire Swedish registry of driving licenses, including pictures, and also sensitive information about bridges, subways, roads and harbors in Sweden. Information that may endanger the security of the country. This has happened: View full article »


Hello World,
Hope you’ll are doing well & i know you are reading this post after reading the post title , RCE in PayPal’s server ? dafaq ? seriously ? View full article »

Most of us who live in big cities are aware of the problems associated with big cities like polluted air, the gritty tap water, noise pollution, and so on. But we are not able to escape from all this for one reason or another. View full article »

WHEN YOU IMAGINE riding a Segway MiniPro electric scooter, your biggest concern is probably falling on your face. Much lower on that list? The notion that attackers could remotely hack your ride, make it stop short, or even drive you into traffic. Unfortunately, as one reacher found, they could have done just that. View full article »

RECALL YOUR FAVORITE memory: the big game you won; the moment you first saw your child’s face; the day you realized you had fallen in love. It’s not a single memory, though, is it? Reconstructing it, you remember the smells, the colors, the funny thing some other person said, and the way it all made you feel. View full article »

The news that disturbed my digital life came two years ago in a snail mail letter strewn with phrases like “malicious cyber intrusion” and “identity theft.” A relative’s company had been part of a massive hack, the note said, leaving my information exposed. Before the letter came, I was a cyber security neophyte: I didn’t use a VPN and encrypted websites were just for banking. I often shopped online, depositing my credit card number over coffee shop wifi. View full article »

Test injections from the NukeBot source code

This spring, the author of the NukeBot banking Trojan published the source code of his creation. He most probably did so to restore his reputation on a number of hacker forums: earlier, he had been promoting his development so aggressively and behaving so erratically that he was eventually suspected of being a scammer. Now, three months after the source code was published, we decided to have a look at what has changed in the banking malware landscape. View full article »