ProtonMail denies that it spies on users for government agencies

7 years ago

The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement. The popular…

Security Affairs newsletter Round 216 – News of the week

7 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition…

ESET analyzes Turla APT’s usage of weaponized PowerShell

7 years ago

Turla, the Russia-linked cyberespionage group, is weaponizing PowerShell scripts and is using them in attacks against EU diplomats. Turla (aka…

GandCrab operators are shutting down their operations

7 years ago

GandCrab first appeared in the threat landscape in early 2018 and continuously evolved over time. Now operators are shutting down…

Apple updates address SQLite, WebKit issues in iTunes and iCloud for Windows

7 years ago

Apple released security updates for Windows versions of iTunes and iCloud, to address recently disclosed SQLite and WebKit security flaws.…

Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

7 years ago

A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan to scan for Docker hosts…

Russian military plans to replace Windows with Astra Linux

7 years ago

The Russian army seems to be in the process of replacing the Windows system with the Debian-based Linux distribution Astra…

0patch released micropatch for BearLPE Zero-Day flaw in Windows 10 Task Scheduler

7 years ago

Researchers at 0patch released a temporary micropatch for the unpatched BearLPE local privilege escalation zero-day flaw in Windows 10. Experts at…

Microsoft warns for the second time of applying BlueKeep patch

7 years ago

Microsoft issued a new warning for users to update their systems to address the remote code execution vulnerability dubbed BlueKeep.…

Security expert shows how to bypass macOS Gatekeeper

7 years ago

A security researcher demonstrated how to bypass the Apple macOS Gatekeeper by leveraging trust in network shares. The Italian security…

This website uses cookies.