Featured Blogs
Hacker Leaves Online Trail, Loses Anonymity
Since March 20, the @Anonw0rmer Twitter account has been silent. Its owner, w0rmer, is known as a member of the...
Hacked for the Holidays: Preparing Your Home for Hackable Toys
The holidays are in full swing and all my kids can think about is their wishlist. With so many new...
Hackable?” Tests Whether Car Key Fobs Are Secure
Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for...
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...
Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records
There’s something ironic about cybercriminals getting “hacked back.” BriansClub, one of the largest underground stores for buying stolen credit card...
Hack the Vote: Pros and Cons of Electronic Voting
After 17 months and billions in campaign spending, it was up to the scores of American people who flooded churches,...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
Guide To Online Banking Safety for Confident Consumers
A recent poll revealed that 54% of U.S. consumers said the theft of their personal or financial information worried them...