Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks
August 21, 2019 - Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?
The Hidden Bee infection chain, part 1: the stegano pack
August 15, 2019 - The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That's why we're dedicating a series of posts to exploring its elements and updates made during one year of its evolution.