Cybercriminals often leverage open-source tools or code in attack campaigns. The use of legitimate tools makes attacks stealthier as they are not flagged as suspicious by...
Recently, some attackers were observed targeting several cryptocurrency services by attacking their hosting service providers. What happened? A hacker group targeted domain hosting provider GoDaddy and tricked its...
Despite the recent coordinated takedown attempt by Microsoft and other groups against the notorious malware TrickBot, the malware operators have released the hundredth build as TrickBot v100 with...
The last year — a harrowing period for the world economy because of the Covid-19 pandemic — was also marked by the rise of the underground market for...
Internet technologist Jim Fenton has questioned the assertion that the future is necessarily ‘passwordless’. Many new authentication technologies are advertising themselves as passwordless. This an attractive promise to...
Security researchers have discovered more than 400,000 subdomains with misconfigured CNAME records, leaving many at risk of malicious takeover as a result. When websites are externally...
A vulnerability in Private-IP, a popular open source NPM package for Node.js applications, opened the door attackers to perform multiple server-side request forgery (SSRF) exploits, researchers have warned. The package,...
A security researcher says he has been banned from online multiplayer game Call of Duty: Modern Warfare after reverse engineering its networking code in pursuit of...
Meet Ian Thornton-Trump. He is the Chief Information Security Officer at Cyjax, and an ITIL certified IT professional with 25 years of experience in IT security...
Crash analysis firm ZecOps has batted away criticism that a recently released iOS exploit presents a privacy risk for researchers that use it. The proof-of-concept (PoC)...