Security researchers discovered that hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security experts…
A new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread. A…
Experts found two critical zero-day flaws in the Foxit PDF Reader that could be exploited by attackers to execute arbitrary…
Ourmine hacker crew hijacked the official Twitter and Facebook accounts for Sony PlayStation Network (PSN) on Sunday and claims to…
The bad actors behind the HBO hack are back and are threatening to leak the final episode of the seventh…
Enigma platform hacked - Another cyber heist made the headlines, this time an unknown hacker has stolen more than $471,000…
A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and…
A new strain of ransomware distributed through spam emails, dubbed SyncCrypt, hides its components inside harmless-looking images. A new strain of ransomware recently discovered, dubbed SyncCrypt, hides its…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. · Anti-Israel…
Learning About ISIS Intentions Using Open Source Intelligence - How terrorists are exploiting technology for propaganda and radicalization. ISIS' weekly newsletter…
This website uses cookies.