Microsoft patches two critical remote code execution (RCE) flaws that have been exploited in attacks

9 years ago

Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have…

Adobe patches tens of vulnerabilities in Flash Player, Shockwave Player, Captivate and Digital Editions

9 years ago

On Tuesday, Adobe released updates for Flash Player, Shockwave Player, Captivate and Digital Editions addressing a total of 20 vulnerabilities.…

Weaponize a Mouse with WHID Injector for Fun & W00t

9 years ago

Researcher Luca Bongiorni has detailed the procedure to weaponize a new mouse with WHID Injector to show you how to…

Emerging Matrix Banker Trojan is targeting banks in Latin America

9 years ago

Security Experts at Arbor Networks have spotted a new banking trojan, initially called 'Matrix Banker', that is targeting Latin America.…

Israeli Intelligence spotted IS plans for Laptop Bomb

9 years ago

Israeli cyber spies hacked into the operations of Islamic State bombmakers and discovered they were developing a laptop bomb to…

ICS Companies Are Worried About Cybersecurity, But Are They Worried About the Right Things?

9 years ago

Companies operating Industrial Control Systems (ICS) have a special set of challenges to deal with. Which is the state of…

Experts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

9 years ago

Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…

MacRansom: The first Mac ransomware offered as a RaaS Service

9 years ago

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…

Egypt blocks dozens of websites including ‘Medium’ without any official announcement

9 years ago

The Egyptian government blocked a number of websites in Egypt, including the publishing platform Medium, without any official announcement. Egyptians…

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

9 years ago

Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark…

This website uses cookies.