Cyber attacks could have a significant impact on businesses, Mondelez International and Reckitt warn of NotPetya effect on the sales. Cyber attacks could have a significant impact on businesses, and two of the worldâs largest consumer goods companies confirmed it. On Thursday the companies Mondelez and Reckitt Benckiser warned of the impact of the NotPetya […]
The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt their files for free. Janus, the author of the original variant of Petya ransomware (that isn’t the NotPetya variant used in the recent massive attack) has made the master key available online. All the victims of the […]
Google warned of a serious flaw dubbed BroadPwn in some Broadcom Wi-Fi chipsets that potentially impacts millions of Android devices. Google published the monthly security update for Android devices, it warned of a serious flaw, dubbed BroadPWN, in some Broadcom Wi-Fi chipsets that potentially impacts millions of Android devices, as well as some iPhone models. BroadPwn is […]
In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber goons always remain on work. Therefore, here we have listed some essential steps that are must to secure your sensitive information you […]
Researchers at Check Point spotted a new family of Android malware dubbed CopyCat that infected 14 million devices and rooted 8 million of them. Researchers at Check Pointâs Mobile Research Team have spotted a new family of Android malware that infected 14 million devices and rooted 8 million of them. According to the expert, the […]
WikiLeaks leaked documents detailing BothanSpy and Gyrfalcon CIA implants designed to steal SSH credentials from Windows and Linux OSs. WikiLeaks has published a new batch of documents from the Vault7 dump detailing two new CIA implants alleged used by the agency to intercept and exfiltrate SSH (Secure Shell) credentials from both Windows and Linux operating systems […]
Perl development team solved a flaw in DBDâMySQL in some configurations that wasn’t enforcing encryption allowing an attacker to power MiTM attacks. The security researcher Pali RohĂĄr reported an important flaw in DBDâMySQL, tracked as CVE-2017-10789, that affects only encryption between client and server. According to the expert, the issue in some configurations wasn’t enforcing encryption allowing an attacker to […]
The AlphaBay Market went down Tuesday night without any explanation, many users that have purchased products on the marketplace fear the Exit-Scam. The news is shocking, the AlphaBay Market, one of the largest Dark Web black markets is down. We have analyzed many times the popular black market where it was possible to buy any kind of […]
CISCO fixed three critical issued in Elastic Services Controller and Ultra Services Framework, admins have to manual patch them. The last weekly security update list published by CISCO includes three critical vulnerabilities affecting the Elastic Services Controller and Ultra Services Framework. The flaw, tracked as CVE-2017-6713,  in the network function virtualisation management environment Elastic Services Controller is […]
As was anticipated by Minister Pier Carlo Padoan, the Taormina G7, he would have to face, inter alia, the overwhelming problem of Web security and the protection of sensitive data. The issue is much more urgent in the light of cyber attacks on computer systems of some key service providers in several EU Member States […]