Sony fixed 2 remotely exploitable flaws in Sony IPELA E Series Network Camera products that could be exploited to execute commands…
Security experts are warning of an intensification of attacks powered by two notorious IoT botnets, Mirai and Gafgyt. Security experts…
The source code of the Exobot Android banking trojan has been leaked online, researchers already verified its authenticity. The source code…
Researchers at CSE Cybsec ZLab analyzed a malicious code involved in a long-term espionage campaign in Syria attributed to a…
The U.S. government should opt to carry out hack backs as retaliation against the massive attacks against organizations in the…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…
According to media, Ecuador is going to hand over the WikiLeaks founder Julian Assange to the UK in “coming weeks…
Proofpoint uncovered a massive malspam campaign leveraging emails delivering weaponized PDF documents containing malicious SettingContent-ms files. Security experts from Proofpoint…
Microsoft has addressed a serious vulnerability in the Microsoft Translator Hub that could be exploited to delete any or all the…
Security experts from Kaspersky Lab have discovered a precursor of the infamous Proton macOS malware that was named Calisto. Malware researchers from…
This website uses cookies.