Zephyrnet Logo

Tag: blackhat

Tips and Tactics for Better Threat Hunting

Learn the tips and tactics for better threat hunting. Register today for Threatpost’s upcoming FREE live webinar, in partnership with Palo Alto...

Latest Steam scam likely a hoax as “Secret Club” makes mysterious appearance

Nick Johnson • Apr 14, 14:57"Fivetowns," "Seventowns," "Vote for my Counter-Strike: Global Offensive team..." All players have heard these before. Steam has no shortage...

The Many Facts Pointing to Cypherpunk Len Sassaman Being Satoshi Nakamoto

Satoshi Nakamoto, the creator of Bitcoin, has all the time been a mysterious character and a large number of sleuths have made it their mission to find the inventor’s id. One specific principle was printed this month which makes an attempt to tether the well-known and now deceased, Len Sassaman to the creation of the […]

The post The Many Facts Pointing to Cypherpunk Len Sassaman Being Satoshi Nakamoto appeared first on Bitcoin Upload.

Len Sassaman and Satoshi

We’ve lost far too many hackers to suicide. What if Satoshi was one of them?

Cyber Intelligence Suffers From ‘Snobby’ Isolationism, Focus on Rare Threats

Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.Cyber-threat intelligence (CTI)...

Navigating the Asia-Pacific Threat Landscape: Experts Dive In

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.Cyberattacks...

Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption

Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.Earlier this year, two...

Is Edtech the Greatest APT?

Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?High-value users...

Digital Clones Could Cause Problems for Identity Systems

Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people...

Researcher Finds New Office Macro Attacks for MacOS

Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.Microsoft Office is no...

IoT Security During COVID-19: What We’ve Learned & Where We’re Going

Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest...

Dark Reading Video News Desk Returns to Black Hat

UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!UPDATED Aug. 6, 2020 -- Usually, the Dark...

Latest Intelligence

spot_img
spot_img