Betabot Trojan Phase II: Stealing credentials and transmitting ransomwares

If there is one thing that hackers and cyber criminals are good at, it’s coming up with new evil Betabot trojans. But can you really…

Rationalizing VM Security: Exploiting DRAMs

When it comes to securing Virtual Machines (VM Security), physical vulnerabilities in memory chips is the Achilles heel amongst all the potential weaknesses currently existing…

Revitalizing Security for Internet of Things (IOT) devices

With the mass adoption of smart devices for Home and industrial usage, the Internet of Things (IOT) ecosystem also introduces a large amount of data…