Breaking News

Israel announced to have foiled an attempted cyber-attack on defence firms

Israel 's defence ministry announced to have foiled an attempted cyber attack by a foreign threat actors group targeting the…

6 years ago

Threat actors managed to control 23% of Tor Exit nodes

A security researcher has discovered that a threat actor controlled roughly 23% of the Tor network’s exit nodes. A security…

6 years ago

SANS Institute Email Breach – 28,000 User Records exposed

The SANS Institute suffered a data breach, 28,000 user records containing personally identifiable information (PII) were exposed. On August 6,…

6 years ago

Agent Tesla includes new password-stealing capabilities from browsers and VPNs

Experts found new variants of Agent Tesla Trojan that include modules to steal credentials from popular web browsers, VPN software,…

6 years ago

City of Lafayette (Colorado) paid $45,000 ransom after ransowmare attack

The City of Lafayette, Colorado, USA, has been forced to pay $45,000 because they were unable to restore necessary files…

6 years ago

Citrix fixed flaws in XenMobile that will be likely exploited soon

Citrix addressed multiple vulnerabilities in Citrix Endpoint Management (XenMobile) that can be exploited by an attacker to gain administrative privileges…

6 years ago

Microsoft August 2020 Patch Tuesday fixed actively exploited zero-days

Microsoft August 2020 Patch Tuesday updates addressed 120 vulnerabilities, including two zero-days that have been exploited in attacks. Microsoft August…

6 years ago

Adobe Acrobat and Reader affected by critical flaws

Adobe has released security updates to address twenty-six vulnerabilities in the Adobe Acrobat, Reader, and Lightroom products. Adobe has released…

6 years ago

Flaws in ‘Find My Mobile’ exposed Samsung phones to hack

A researcher found multiple flaws in Samsung’s Find My Mobile that could have been chained to perform various malicious activities…

6 years ago

Avaddon ransomware operators have launched their data leak site

Avaddon ransomware operators, like other cybercrime groups, decided to launch a data leak site where publish data of victims who…

6 years ago

This website uses cookies.