Microsoft published an interesting report that investigates web shell attacks, the IT giant says it detects 77,000 active web shells…
Researcher published details about a backdoor mechanism he found in HiSilicon chips, but he did not report it to the…
File hosting service company Dropbox paid out $1 million for vulnerabilities reported by researchers through its bug bounty program. Since…
Facebook addressed a critical issue in WhatsApp that would have allowed attackers to read files from a user's local file…
A German artist demonstrated how using a simple trick it is possible to deceive Google Maps and create a virtual…
The Australian transportation and logistics giant Toll Group has suffered a ransomware attack that forced it to shut down part…
Twitter discloses a security incident involving third-parties that exploited its official API to match phone numbers with Twitter usernames. On December 24,…
Apple researcher discovered an important vulnerability (CVE-2019-18634) in 'sudo' utility that allows non-privileged Linux and macOS users to run commands…
Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The…
TVEyes was brought down after its core server and engineering workstations were infected with a ransomware attack, company CEO confirmed.…
This website uses cookies.