Category: Privacy

  • Blog
  • Category: Privacy
Google’s Open-Source YARA Rules for Cobalt Strike Detection
Google’s Open-Source YARA Rules for Cobalt Strike Detection
Google’s Open-Source YARA Rules for Cobalt Strike Detection
Google’s Open-Source YARA Rules for Cobalt Strike Detection

Google’s Open-Source YARA Rules for Cobalt Strike Detection

Google has announced the release of YARA rules and a VirusTotal collection to help improve detection of Cobalt Strike attacks. Cobalt Strike is a tool used by attackers to gain remote access to systems and is difficult to detect with traditional security mechanisms. The new YARA rules and VirusTotal collection are designed to help security

Cybersecurity Companies Facing Recession Struggles

With the pandemic’s economic implications, many companies across various industries have been hit hard. Last week, two of the most prominent cybersecurity firms, Snyk and Cybereason, announced significant layoffs. These two join a growing list of more than three dozen firms who have restructured or cut their workforce in the past six months due to

Vulnerabilities in SiriusXM Connected Vehicle Services

Connected vehicles are becoming more and more popular with drivers all over the world. However, a recent vulnerability in the SiriusXM connected vehicle services has exposed cars from Honda, Nissan, Infiniti, and Acura to remote attacks. Just by knowing the vehicle’s vehicle identification number (VIN), attackers can retrieve a victim’s personal details as well as

VPN providers flee Indian market ahead of new data rules

VPN’s can sometime scare people, or from time to time I hear the old saying “I have nothing to hide so I might as well provide (insert authority here) with the information they are asking for.” The problem with this thought is, when you look at a VPN like it’s a lock on your bathroom