Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in…
A group of Israeli researchers demonstrated that it is possible to take over the Simatic S7 controller one of the…
Security researchers at McAfee have discovered that a vulnerability patched ten years ago is still affecting several Avaya phones. Security…
Another city in the United States was hit by a cyber attack, according to officials in the city of Naples…
At the Blackhat cybersecurity conference, Apple has announced a few major changes to its bug bounty program that will be…
Two researchers publicly disclosed a zero-day vulnerability that affects the popular Steam game client for Windows, 0ver 100 million users…
Security experts at CheckPoint discovered a series of vulnerabilities in WhatsApp that could be exploited by attackers to tamper with…
Avast spotted a new strain of Clipsa malware that is used to mine and steal cryptocurrencies along with carrying out…
Cisco has released security updates to address several vulnerabilities in Cisco Small Business 220 Series Smart Switches. Cisco released security…
Security researcher Marco Ramilli presents a comparative analysis of attacks techniques adopted by the Iran-Linked OilRig APT group. Today I’d like…
This website uses cookies.