Breaking News

Exclusive: Dirty Political Spying Attempt behind the FHAPPI Campaign: all the details in the interview with @unixfreaxjp

The role of China (PRC) in the worldwide cyber espionage game of conditioning political life: when reserved information are brandished…

9 years ago

Over 20 million Gmail and 5 million Yahoo accounts available for sale on the Dark Web

The vendor "SunTzu583" is offering for sale over 20 million Gmail and 5 million Yahoo login credentials on the Dark…

9 years ago

McDonald’s McDelivery app leaks details of over 2.2 million customers

The McDelivery application used by McDonald’s customers in India was found to be leaking the personal data of more than…

9 years ago

CIA Vault7 Leak – Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution flaw

After the leak of the CIA Vault7 archive, experts from CISCO warn of Cisco IOS and IOS XE Software Cluster…

9 years ago

Researcher leveraged App Paths to bypass User Account Control in Windows 10

The security expert Matt Nelson has devised a new method that leverages App Paths to bypass the User Account Control (UAC) only on Windows…

9 years ago

Kirk ransomware – A Star Trek Themed Ransomware that requests Monero payments

The researchers have discovered a new piece of ransomware featuring a Star Trek theme, dubbed Kirk ransomware, the first one…

9 years ago

Fappening 2.0 – More explicit pictures of celebrities leaked online

Fappening 2.0, Nude pictures of several celebrities have been leaked online, including Rose McGowan, Amanda Seyfried and Jillian Murray. Here…

9 years ago

Arbor Networks linked a new Acronym Malware to the Potao Express campaign

Security experts at Arbor Networks linked a new Acronym malware to the malicious code used by threat actors behind the…

9 years ago

Security Affairs newsletter Round 104 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago

WikiLeaks will disclose CIA exploits to tech companies under specific conditions

Assange sent an email to tech firms including "a series of conditions" that they need to fulfill before gaining access…

9 years ago

This website uses cookies.