/f/research

Researchers Exposed Predator Spyware Infrastructure & Domains Associated _gbhackers.com
| posted in rouiejay12 No comments |
1

The Hidden Injustice of Cyberattacks _wired.com
| posted in rouiejay12 No comments |
1

How 3 Million ‘Hacked’ Toothbrushes Became a Cyber Urban Legend _wired.com
| posted in rouiejay12 No comments |
1

The fight against commercial spyware misuse is heating up _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Attack of the copycats: How impostor apps and fake app mods could bite you _welivesecurity.com
| posted in rouiejay12 No comments |
1

Cloud squatting: How attackers can use deleted cloud assets against you _csoonline.com
| posted in rouiejay12 No comments |
1

Researcher discovered a new lock screen bypass bug for Android 14 and 13 _securityaffairs.com
| posted in rouiejay12 No comments |
1

Employees breaking security policies just dangerous as being hacked, Kaspersky global study shows _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Why Botnets Persist: How to Stop Direct-Path DDoS Attacks _securityboulevard.com
| posted in rouiejay12 No comments |
1

Software vulnerabilities are declining, but third-party risks still linger _itpro.com
| posted in rouiejay12 No comments |
1

CherryBlos, the malware that steals cryptocurrency via your photos - what you need to know _tripwire.com
| posted in rouiejay12 No comments |
1

Who’s Behind the SWAT USA Reshipping Service? _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date _techrepublic.com
| posted in rouiejay12 No comments |
1

Step-by-step through the Money Message ransomware _news.sophos.com
| posted in rouiejay12 No comments |
1

Cloudflare: Sees an increase in hyper-volumetric HTTP DDoS attacks _en.secnews.gr
| posted in rouiejay12 No comments |
1

Salt Security Discovers Flaws in Social Login Mechanism Impacting Thousands of Websites and Exposing Billions of Users to Account Takeover _itsecurityguru.org
| posted in rouiejay12 No comments |
1

SolarWinds: Serious RCE vulnerabilities discovered _en.secnews.gr
| posted in rouiejay12 No comments |
1

Researchers uncover DarkGate malware's Vietnamese connection _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Research Reveals Vast Majority of Organisations Report DevOps Delays Due to Critical Security Issues _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Rezilion Researchers Uncover New Details on Severity of Google Chrome Zero-Day Vulnerability (CVE-2023-4863) _securityboulevard.com
| posted in rouiejay12 No comments |
1

Snatch ransomware - what you need to know _tripwire.com
| posted in rouiejay12 No comments |
1

Who’s Behind the 8Base Ransomware Website? _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Generative AI Adoption Surges in Software Development Despite Security Risks, Sonatype Research Finds _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Researchers identify high-grade phishing kits attacking nearly 60,000 Microsoft 365 accounts _cyberscoop.com
| posted in rouiejay12 No comments |
1

Australian Data Breach Costs are Rising — What Can IT Leaders Do? _techrepublic.com
| posted in rouiejay12 No comments |
1

Researchers identify high-grade phishing kits attacking nearly 60,000 Microsoft 365 accounts _cyberscoop.com
| posted in rouiejay12 No comments |
1

Japanese agency discovers malicious PDF that bypasses detection _cybernews.com
| posted in rouiejay12 No comments |
1

Detecting Malware Through Hardware-Integrated Protection _homelandsecuritynewswire.com
| posted in rouiejay12 No comments |
1

New Study Sheds Light on ADHUBLLKA Ransomware Network _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Researchers Uncovered the Developer of CypherRAT and CraxsRAT _gbhackers.com
| posted in rouiejay12 No comments |
1

How a hacking crew overtook a satellite from inside a Las Vegas convention center and won $50,000 _cyberscoop.com
| posted in rouiejay12 No comments |
1

“Snakes in airplane mode” – what if your phone says it’s offline but isn’t? _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

The Plan to Better Protect US Hospitals From Ransomware _wired.com
| posted in rouiejay12 No comments |
1

How to hack casino card-shuffling machines _bitdefender.com
| posted in rouiejay12 No comments |
1

New Study Backs An Identity-First and Inside-Out Approach to Cloud Security _securityboulevard.com
| posted in rouiejay12 No comments |
1

How Malicious Android Apps Slip Into Disguise _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Zenbleed: How the quest for CPU performance could put your passwords at risk _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Who and What is Behind the Malware Proxy Service SocksEscort? _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Zero trust rated as highly effective by businesses worldwide _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Google Virus Total leaks list of spooky email addresses _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1