Companies operating Industrial Control Systems (ICS) have a special set of challenges to deal with. Which is the state of…
Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…
Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…
The Egyptian government blocked a number of websites in Egypt, including the publishing platform Medium, without any official announcement. Egyptians…
Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark…
France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…
Security experts have discovered a critical kernel command line injection vulnerability in the Motorola handsets Moto G4 and Moto G5.…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. · Nexpose…
DARPA is currently developing a multifactor authentication system that will replace the current common access card (CAC). According to a…
Security experts from Kaspersky confirmed that threat actors in the wild are exploiting the SambaCry vulnerability CVE-2017-7494 to spread a…
This website uses cookies.