Breaking News

Hackers stole $750,000 worth Bitcoin from Electrum wallets

The latest attack of 2018 against cryptocurrency wallets and organizations in the cryptocurrency industry hit the popular Electrum wallets. Hackers…

7 years ago

Experts analyzed the distribution technique used in a recent Emotet campaign

ESET analyzed the distribution technique used by cyber criminals in new Emotet campaign that has recently affected various countries in…

7 years ago

Experts show that is easy to hack Hardware-based Cryptocurrency Wallets

A team of researchers demonstrated that cryptocurrency wallets Trezor and Ledger are vulnerable to several type of attacks. During the…

7 years ago

EU launches bug bounty programs for 15 software

The European Commission decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project. Bug…

7 years ago

SandboxEscaper released PoC code for a new Windows zero-day

Security expert SandboxEscaper published a proof-of-concept (PoC) code for a new Windows zero-day, it is the fourth she released this…

7 years ago

Malware-based attack hit delivery chain of the major US newspapers

The LA Times revealed that a malware-based attack hits the delivery chain of the major US newspapers delaying the hardcopy…

7 years ago

‘Roma225’ campaign targets companies in the Italian automotive sector

'Roma225' campaign -The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive…

7 years ago

Facebook tracks non-users via Android Apps

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According to a report presented…

7 years ago

Security Affairs newsletter Round 194 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

7 years ago

Hackers bypassed vein based authentication with a fake hand

A couple of researchers demonstrated how to bypass vein based authentication using a fake hand build from a photo. If…

7 years ago

This website uses cookies.