55 Results for:IRC

  • Sort by: 

The history and evolution of social media explained

By Madeleine Streets 11 Jul 2023

From the early days of AOL and MySpace to today's giants YouTube, Facebook and TikTok, social media has evolved into a critical part of modern culture worldwide. Read More

Bishop Fox’s Vinnie Liu talks offensive security skills

By Peter Ray Allison 08 Jun 2023

There is growing demand for offensive security testing, but it needs a multi-layered skillset that can be hard to quantify. Bishop Fox’s CEO and co-founder explains why and some potential mitigation strategies Read More

Symantec Dark Vision app monitors underground IRC servers

By Dennis Fisher 25 Sep 2006

New research project keeps tabs on the hacker underground, providing new insight on activities like credit card theft and spamming. Read More

How does the MnuBot banking Trojan use unusual C&C servers?

By Nick Lewis 15 Oct 2018

IBM X-Force found MnuBot -- a new banking Trojan -- manipulating C&C servers in an unusual way. Learn how this is possible and how this malware differs from those in the past. Read More

7 tips to choose the right Java library

By Joseph B. Ottinger 01 Apr 2022

Your application is only as secure and reliable as the external libraries you use. Here's a list of the top 7 things to consider when choosing a software library for your project. Read More

Understanding the new breed of command-and-control servers

By Nick Lewis 01 Mar 2019

Command-and-control servers are now using public cloud services, social media and other resources to evade detection. What should enterprises do to combat these threats? Read More

How does UBoatRAT use Google services and GitHub to spread?

By Nick Lewis 15 Jun 2018

A new remote access Trojan called UBoatRAT was found spreading via Google services and GitHub. Learn how spotting command-and-control systems can protect enterprises with Nick Lewis. Read More

Why MSPs should care about vulnerability disclosure programs

14 Oct 2021

Vulnerability disclosure programs can vary widely from vendor to vendor. Here's everything MSPs should look for in programs when doing security research. Read More

DNS worm strikes at Microsoft flaw

By Dennis Fisher 16 Apr 2007

A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers. Read More

TalkTalk hacker Daniel Kelley gives up his black hat for good

By Nicholas Fearn 16 Jun 2022

After serving a four-year prison sentence for his role in the 2015 TalkTalk hack and other cyber offences, Daniel Kelley now wants to pursue a legitimate cyber security career Read More