Thursday, April 25, 2024

tag:

analysis

TOP 10 Most Dangerous logins most regularly found for sale online

Over 24 billion usernames and passwords are up for grabs on...

Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method

Abstract The aim of this paper is to analyze the techniques for...

Apple confirms the scale of App Store fraud

Apple says millions of fraudulent attempts are made against the App...

Hacked Websites Threat Report 2021

Our 2021 Website Threat Research Report details our findings and analysis...

Sina Weibo, China’s Twitter Analogue, Reveals Users’ Locations and IP Addresses

To the surprise of many users, China's largest Twitter-esque microblogging website,...

Analysis of BlackGuard – a new info stealer malware being sold in a Russian hacking forum

Introduction: Hacking forums often double up as underground marketplaces where cybercriminals buy,...

Malware Using NVIDIA’s Recently Stolen Code Signing Certificates

Threat actors are using stolen NVIDIA code signing certificates to sign...

Microsoft, Apple and Google top the list of the most spoofed brands in 2021

IBM’s 2022 X-Force Threat Intelligence Index also revealed that ransomware was...

$400 million of ransomware revenue went to Russia-linked groups in 2021

Blockchain analysis shows that funds paid in extortion are laundered through...

Windows Privilege Elevation Exploit POC Released into The Wild

A security researcher has publicly disclosed an exploit for a Windows...