Security experts at Trend Micro have demonstrated that certain models of Sonos and Bose speakers are affected by vulnerabilities that…
The experts from Netskope Threat Research Labs discovered the Hackshit PhaaS platform, another interesting case of crimeware-as-a-service. A few days ago,…
WikiLeaks released documents detailing the Cherry Blossom framework which is being used by the CIA cyber spies to hack into…
Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have…
Shadow Brokers is going to launch a monthly subscription model for its data dumps, 0-Day Exploit Subscriptions goes for $21,000…
Locked Shields is the world’s largest and most advanced international technical live-fire cyber defence exercise organized by the NATO since…
A new report published by Kaspersky confirms that Stuxnet exploits targeting a Windows Shell Vulnerability is still widely adopted by…
According to Kaspersky Lab, crooks have robbed at least 8 ATMs in Russia and stole $800,000 in just one night…
Researchers devised a new attack method that can be leveraged to track mobile devices that rely on MAC address randomization…
A flaw in Twitter allowed attackers to access locked accounts bypassing the locking mechanism implemented by the company. A flaw…
This website uses cookies.