The Sundown EK has been inactive since early this year, the Terror EK is being very popular in the cybercriminal…
The Callisto APT Group borrowed the source code leaked by hackers that broke into Hacking Team network. According to F-Secure Labs,…
Security experts discovered vulnerabilities in the Bosch Drivelog Connector dongle that could be exploited by hackers to stop the engine.…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
Facebook disrupted an international spam campaign leveraging on bogus accounts used to create "likes" and bogus comments. The security team…
Microsoft determined that most of the flaws exploited by the tools in the dump released by Shadow Brokers yesterday were…
A bug dubbed Riddle vulnerability affecting MySQL 5.5 and 5.6 clients exposed user credentials to MiTM attacks. Update to version 5.7.…
The Shadow Brokers group released a 117.9 MB encrypted dump containing documents that suggest NSA hacker SWIFT system in the…
Cisco issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, another for a flaw affecting…
The Linux remote vulnerability tracked as CVE-2016-10229 poses Linux systems at rick of hack if not patched. A Linux kernel vulnerability,…
This website uses cookies.