Exploit Fully Breaks SHA-1, Lowers the Attack Bar

Exploit Fully Breaks SHA-1, Lowers the Attack Bar

A proof-of-concept attack has been pioneered that “fully and practically” breaks the Secure Hash Algorithm 1 (SHA-1) code-signing encryption, used by legacy computers to sign…

View More Exploit Fully Breaks SHA-1, Lowers the Attack Bar
Imperva: Data Breach Caused by Cloud Misconfiguration

Imperva: Data Breach Caused by Cloud Misconfiguration

Imperva, the security vendor, said this week that a misconfiguration of an Amazon Web Services (AWS) cloud instance allowed hackers to exfiltrate information on customers…

View More Imperva: Data Breach Caused by Cloud Misconfiguration
New Dridex Malware Strain Avoids AV Detection

New Dridex Malware Strain Avoids AV Detection

A new variant of the Dridex banking Trojan has been shaken up with the ability to avoid detection by traditional antivirus products. Dridex is a…

View More New Dridex Malware Strain Avoids AV Detection