Get a Pentest and security assessment of your IT network.

Cyber Security

Researchers use ‘fingerprints’ to track Windows exploit developers

Check Point security researchers have developed a new “fingerprinting”” technique to find the developer of a Windows exploit. The method involves looking for uncommon source code identifiers that can be associated with a specific exploit writer such as unique artifacts (such as strings

Source: code snippets

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security