AuthorKelly Jackson Higgins Executive Editor at Dark Reading
Avast's RetDec machine-code decompiler now available for free on Github.
Real-world incident response investigation data from CrowdStrike reveals attacker trends with file-less malware, ransomware, and other weapons.
Researchers at Black Hat Europe today revealed how a buffer overflow they discovered in the chip's firmware can be abused to take control of a machine - even when it's turned 'off.'
Avalanche, aka Gamarue, aka Wauchos, malware enterprise spanned hundreds of botnets and 88 different malware families.
Another big firmware security issue affecting Intel processors, requires OEM updates.
Quad9 blocks malicious sites used in phishing, other nefarious activity.
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
Researchers at Black Hat Europe next month will demonstrate a data-exfiltration attack on Siemens PLCs that uses combination of code manipulation and Radio Frequency (RF) emissions.