Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The…
The researchers at the Tor project are working on a new distributed random number generator that will be included in…
Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores.…
What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here…
The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers…
Japanese police are investigating coordinated raids across stores in Japan that resulted in the theft of $13m from ATMs in…
Cisco issued a series of patches for the AsyncOS operating on CISCO WSA that fix multiple high severity Denial-of-Service (DoS)…
A security researcher from ESET security firm issue a Teslacrypt decryption tool after the author closed the project and released…
A crew of cyber spies named Suckfly group is targeting organizations in India, it conducted long-term espionage campaigns against entities…
The vulnerability CVE-2016-4010 allows an unauthenticated attacker to execute PHP code at the vulnerable Magento server and fully compromise the…
This website uses cookies.