This report examines Android platform mining malware from January 2013 to January 2018. It covers the scale and impact of these threats, preferred cryptocurrenc
Explore the reasons why browsers have not yet enabled default support for TLS 1.3, focusing on issues with middleboxes and how security protocol updates can imp
A security threat involving malicious code exploiting the Android Debug Bridge (ADB) interface to spread and mine Monero tokens. The infection targets devices w
Discover the detailed analysis of a malicious program that uses DNS tunnel for C&C communication. Learn about the unique design and multi-layered protocol struc
A new remote trojan has been identified by 360 Security Center targeting e-commerce wholesalers. The 'White+Black' trap disguises as a legitimate file to instal
Learn how a Spanish security researcher bypassed the Controlled Folder Access feature in Windows 10 to evade anti-ransomware protection. Discover the method usi
Explore the details of the remote code execution and denial-of-service (DoS) vulnerabilities in Cisco ASA and next-generation firewalls. Learn about affected ve