network attack
-
The world's largest cyber attack service Webstresser.org, collapsed
webstresser.org, the world's largest website for denial of service (ddos) attacks, has caused more than 4 million network attacks to be knocked down.
-
Alibaba and the fortified Jack Ma wall made the Chinese hackers terrified
to deal with dangerous hackers, jack ma decided to recruit all those who attacked alibaba's network to the company to work for themselves.
-
Apple updates XProtect to block 'Windows' malware on a Mac
apple's xprotect security software has recently been quietly updated to add some signature to help detect windows pe files as well as windows executable files that can be run on mac using mono .net framework.
-
Dell computers became victims of RCE attacks by vulnerabilities in SupportAssist
dell recently quietly released a new security update to patch the supportassist client software vulnerability, potentially allowing attackers to not authenticate on the same network access layer using executable malware from away from arbitrary privileges on the victim's computer.
-
Deep Learning - new cybersecurity tool?
artificial intelligence (ai) is increasingly contributing to every area of human life. among the sub-domains of artificial intelligence in general and machine learning in particular, it can be said that deep learning is a truly outstanding technological breakthrough.
-
UC Browser Android - lucrative bait for URL spoofing attacks
with over 600 million installations through play store, uc browser and uc browser mini android are one of the most used mobile browser platforms in the world.
-
What do you know about the first 'cyber attack' in the world?
temporarily restraining the 'contemplative' reality of today's global cyber security, we try to go back too much to the early days of the concept of 'cyber attack'. do you know when the world's first cyber attack occurred?
-
Endpoint Detection and Response threats, an emerging security technology
endpoint threat detection and response (etdr) is a term first introduced by security expert anton chuvakin from gartner in 2013 to refer to the tools mainly focus on detecting and investigating suspicious activities (as well as traces of other phenomena that don't always happen) on the server or
-
Insider attacks are becoming more and more popular and difficult to detect
internal attacks are becoming more and more popular in recent years.
-
Hackers antivirus application preinstalled on Xiaomi phones into malware
what's more tragic when the tools that are considered shields for your device can now turn into malware that paves the way for unauthorized infringement, through the 'variable hand? virtual 'hackers'.
-
There were 12,449 serious data breaches recorded in 2018, an increase of 424% compared to 2017
a recent statistical report showed alarming facts. specifically, the number of confirmed data violations in 2018 has reached 12,449 cases, an increase of 424% compared to 2017.
-
Attack analysis uses Excel 4.0 macros to disguise
on october 18, 2018, 360 threat intelligence center for the first time recorded an example of an attack using excel 4.0 macro to spread the trojan remote control imminent monitor.