The recently discovered ImageMagick critical vulnerability (CVE-2016-3714) is being exploited in the wild for reconnaissance. The security researcher John Graham-Cumming…
Is the North Korea behind the hack of a South Korean defense contractor? The officials announced an investigation into the…
CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited to launch malware-based attacks in the…
The Euro 2016 will be held in June in France and online fraudsters already started launching football-themed spam campaigns on…
White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on…
A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power…
The security expert David Levin was arrested and charged after discovering serious security flaws on a couple of election websites…
Twitter has blocked the US intelligence agencies from accessing a service that allows the real-time analysis of the content posted…
A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is…
According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have…
This website uses cookies.