Security experts at Trend Micro have discovered that iOS URL scheme could allow an attacker to hijack users' accounts via…
Some of the crooks behind the Dridex Trojan have split from the gang and released a forked version of the…
A critical vulnerability affecting the Ad Inserter WordPress plugin could be exploited by authenticated attackers to remotely execute PHP code. Security researchers at Wordfence…
It has happened again, another JavaScript package in the npm registry has been compromised, it is the installer for PureScript. The installer…
Instagram has recently addressed a critical flaw that could have allowed hackers to take over any Instagram account without any…
On July 6, a ransomware attack brought down government computer systems at La Porte County, Indiana, finally, the county decided…
A serious vulnerability in Walkie-Talkie App on Apple Watch forced the tech giant to disable the applications to avoid attackers…
The UK's National Cyber Security Centre (NCSC) issued a security advisory to warn organizations of DNS hijacking attacks and provided…
Brazilian users have been targeted by a large number of router attacks aimed at modifying the configuration of their routers…
The Magecart continues to target websites worldwide, it infected over 17,000 domains by targeting improperly secured Amazon S3 buckets. The…
This website uses cookies.