Slingshot APT: Riding on a hardware Trojan horse
One of the most sophisticated APT campaigns ever analyzed by our experts.
28 articles
One of the most sophisticated APT campaigns ever analyzed by our experts.
Experts from Kaspersky Lab studied digital evidence related to the hacking attack on the 2018 Olympics in search of the actual attacker.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Samsung releases more and more devices with Tizen OS. At SAS 2017, we found out that this OS is highly insecure.
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. [youtube http://www.youtube.com/watch?v=kMnF3xDnAQg&feature=youtu.be?rel=0]