Posts From Seid Yassin

SynAck targeted ransomware was seen in the wild using the Doppelgänging technique which was first presented as a proof of concept in December 2017. SynAck targeted ransomware was seen in the wild using the Doppelgänging technique which was first presented

The ISO has brought together a team of privacy experts to develop the first set of preventative international guidelines to ensure consumer privacy is embedded into the design of a product or service. Cyber-security professionals have long been lamenting the

The US has turned up the pressure on Chinese technology firms after the Department of Defense ordered all military bases to stop selling Huawei and ZTE devices out of security concerns. The Pentagon is also said to be considering whether

Warren Buffett believes cybersecurity incidents will rise, and with it the potential to significantly harm the insurance industry. “Cyber is uncharted territory. It’s going to get worse, not better,” he said at the Berkshire Hathaway 2018 Annual Shareholders Meeting Saturday.

Not long after the Russian government ordered the immediate blocking of the Telegram messaging app from the Apple App Store and Google Play Store, an imitation of the popular app made its rounds on Google Play. Confusion surrounding the prompt

Whether serendipitous or ironic, Global Password Day found Twitter advising users to change their passwords after a bug in its password storage system “unmasked” the passwords in an internal log. “We have fixed the bug, and our investigation shows no

From a cruising altitude, a blockchain might not look that different from things you're familiar with, say Wikipedia. With a blockchain, many people can write entries into a record of information, and a community of users can control how the
It's an exciting time to be a professional penetration tester. As malicious computer attackers amp up the number and magnitude of their breaches, the information security industry needs an enormous amount of help in proactively finding and resolving vulnerabilities. Penetration
The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security. The OWASP Top 10 Web Application Security Risks was updated in 2017 to provide guidance to developers and security professionals
Penetration testing, more commonly called pentesting, is the practice of finding holes that could be exploited in an application, network or system with the goal of detecting security vulnerabilities that a hacker could use against it. Pentesting is used to
Advanced Persistent Threat (APT): An attack in which an unauthorized actor, often a nationstate,employs highly sophisticated technology and/or tactics to gain and maintain surreptitious access to a network. The intention of an APT may be to steal data, or to

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern cyber threats. Microsoft provided the recent Triton and NotPetya attacks as examples of significant threats hitting critical infrastructure. Triton was

The world’s largest online marketplace for selling and lauching distributed denial-of-service (DDoS) attacks was shut down this week as part of Operation Power Off, an international investigation into the so-called Webstresser.org site. The effort was led by the UK National

GravityRAT, a remote access trojan targeting organisations across India, boats an unusual trick for evading analysis: taking a reading of the target computer’s temperature. The trojan only detonates its payload if the thermal reading is below a certain level, because

If you receive a link for a video, even if it looks exciting, sent by someone (or your friend) on Facebook messenger—just don’t click on it without taking a second thought. Cybersecurity researchers from Trend Micro are warning users of

Amazon put a quick stop to an issue in Alexa’s skill set after Chexmarx researchers reported that her skill set could be expanded to listen in on users not just some of the time but all of the time. According to a Checkmarx research