Researchers prove that Intel SGX and TSX can hide malware from antivirus software

Researchers Michael Schwarz, Samuel Weiser, and Daniel Gruss from Graz University of Technology  have published a research paper that demonstrates how the Intel SGX currently poses as a security threat. The SGX (Software Guard eXtensions) allows m… Continue reading Researchers prove that Intel SGX and TSX can hide malware from antivirus software

Google open sources ClusterFuzz, a scalable fuzzing tool

Google made its scalable fuzzing tool, called ClusterFuzz available as open source, yesterday. ClusterFuzz is used by Google for fuzzing the Chrome Browser, a technique that helps detect bugs in software by feeding unexpected inputs to a target program… Continue reading Google open sources ClusterFuzz, a scalable fuzzing tool

Undetected Linux Backdoor ‘SpeakUp’ infects Linux, MacOS with cryptominers

Security Researchers have discovered a new backdoor trojan, dubbed as ‘SpeakUp’ which exploits known vulnerabilities in six different Linux distributions and has the ability to infect MacOS. This trojan discovered by Check Point Research, i… Continue reading Undetected Linux Backdoor ‘SpeakUp’ infects Linux, MacOS with cryptominers

Fortnite just fixed a bug that let attackers to fully access user accounts, impersonate real players and buy V-Buck

Yesterday, Epic Games, the developer of Fortnite, an online video game acknowledged the existence of a bug in the game (Fortnite). This bug could let attackers access user accounts by impersonating as real gamers and purchase V-Buck, Fortnite’s i… Continue reading Fortnite just fixed a bug that let attackers to fully access user accounts, impersonate real players and buy V-Buck

35-year-old vulnerabilities in SCP client discovered by F-Secure researcher

Yesterday, Harry Sintonen, researcher at F-Secure, discovered 35-year-old vulnerabilities associated with SCP (Secure Copy Protocol) client, a network protocol, that uses Secure Shell (SSH) for data transfer between hosts on a network. These SCP client… Continue reading 35-year-old vulnerabilities in SCP client discovered by F-Secure researcher

Hyatt Hotels launches public bug bounty program with HackerOne

Hyatt Hotels Corporation launched its bug bounty program with HackerOne, earlier this week. As part of the bug bounty program, ethical hackers are invited to test Hyatt websites and apps to spot potential vulnerabilities in them. “At Hyatt, prote… Continue reading Hyatt Hotels launches public bug bounty program with HackerOne

Using deep learning methods to detect malware in Android Applications

Researchers from the North China Electric Power University have recently published a paper titled, ‘A Review on The Use of Deep Learning in Android Malware Detection’. Researchers highlight the fact that Android applications can not only be… Continue reading Using deep learning methods to detect malware in Android Applications

EU to sponsor bug bounty programs for 14 open source projects from January 2019

Julia Reda, EU member of the parliament, announced, last week, that EU will be funding the internet bug bounty programs for 14 out of the total 15 open source projects, starting January 2019. The Internet Bug Bounty programs are rewards for friendly ha… Continue reading EU to sponsor bug bounty programs for 14 open source projects from January 2019