Reports

Kaspersky found dozens of flaws in 4 open-source VNC software

Kaspersky researchers found dozens of flaws in four popular open-source virtual network computing (VNC) systems. Experts from Kaspersky analyzed several…

4 years ago

ENISA publishes a Threat Landscape for 5G Networks

ENISA, the European Union Agency for Cybersecurity publishes a Threat Landscape for 5G Networks, assessing the threats related to the…

4 years ago

Experts report a rampant growth in the number of malicious, lookalike domains

Cyber security firm Venafi announced it has uncovered lookalike domains with valid TLS certificates that appear to target major retailers.…

4 years ago

‘Light commands’ attack: hacking Alexa, Siri, and other voice assistants via Laser Beam

Experts demonstrated that is possible to hack smart voice assistants like Siri and Alexa using a lasers beam to send…

5 years ago

NCSC Report: U.K. neutralized over 600 cyber attacks this year

NCSC Report: U.K. has neutralized more than 600 cyber attacks this year, most of them launched by threat actors from…

5 years ago

More than 737 million medical radiological images found on open PACS servers

Researchers at Greenbone Networks vulnerability analysis and management company discovered 400 Million medical radiological images exposed online via unsecured PACS…

5 years ago

Cyber Defense Magazine – September 2019 has arrived. Enjoy it!

Cyber Defense Magazine September 2019 Edition has arrived. We hope you enjoy this month’s edition…packed with over 179 pages of…

5 years ago

A total of six hackers already become millionaires on HackerOne

HackerOne announced that five more hackers have become millionaires thanks to their contributes to the bug bounty programs managed by…

5 years ago

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

A study conducted by researchers at Cyjax revealed that organizations expose sensitive data via sandboxes used for malware analysis. Experts…

5 years ago

Sonicwall warns of a spike in the number of attacks involving encrypted malware and IoT malware

According to experts at Sonicwall, scanning of random ports and the diffusion of encrypted malware are characterizing the threat landscape.…

5 years ago

This website uses cookies.