Black Hat 2023: Cyberwar fire-and-forget-me-not
What happens to cyberweapons after a cyberwar?
What happens to cyberweapons after a cyberwar?
ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server.
Analysis of Telegram bot that helps cybercriminals scam people on online marketplaces
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new…
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla?…
Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but…
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the…
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can…
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a…
Current cryptographic security methods watch out – quantum computing is coming for your lunch.