PowerShell Obfuscation Ups the Ante on Antivirus
A new obfuscation technique has been spotted that uses the features of PowerShell, a tool that comes built in to Microsoft Windows. Analysis from Cylance shows Read More
A new obfuscation technique has been spotted that uses the features of PowerShell, a tool that comes built in to Microsoft Windows. Analysis from Cylance shows Read More
After staying dormant for few years, the Kronos banking trojan resurfaced in July in a form dubbed Osiris. A wider analysis of how the banking Read More
As the E.U. continues to develop tactics to better combat terrorism, European authorities plan to propose strict rules about content policing by tech giants such Read More
A pair of researchers have developed an attack method that can bypass mitigations for cold-boot attacks on laptops. A physical attacker can compromise a laptop Read More
An internet of things (IoT) bill that would mandate unique passwords for connected devices has been approved by the California state legislature. It will be Read More
Matan Or-El, co-founder and CEO at Panorays Third-party breaches have become an epidemic as cybercriminals target the weakest link. Organizations such as BestBuy, Sears, Delta Read More
Attacks using malicious Microsoft macros, always a popular method for compromising target machines, are more virulent than ever, accounting for 45 percent of all delivery Read More
A mobile spyware campaign against mainly Iranian citizens has been spotted – with evidence that the Iranian government might be involved. The operation is dubbed Read More
Hours after researchers publicly disclosed an app that was caught stealing and uploading browser history data, Apple removed it from the Mac App Store. Read Read More
The recent British Airways breach of up to 380,000 payment cards, has been attributed to the infamous Magecart threat actor. Last week, British Airways revealed Read More