US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for…
Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to…
A group of researchers has demonstrated that the cost of breaking the SHA-1 hash algorithm is lower than previously estimated.…
Experts at Volexity discovered a hacking campaign targeting the CISCO WebVPN VPN product, attackers aim to steal corporate login credentials.…
The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage…
Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitors’ Microsoft Identifier (CID) in plain text. A…
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from…
The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had…
The nuclear industry is still unprepared to respond cyberattacks exposing civil nuclear facilities worldwide at risk of cyber attacks. Civil…
The Independent AV-Test Institute has analyzed 16 Linux security solutions against Windows and Linux threats under Ubuntu. The results are…
This website uses cookies.