Hacking Kia cars made after 2013 using just their license plate

1 year ago

Researchers discovered critical flaws in Kia's dealer portal that could allow to hack Kia cars made after 2013 using just…

Critical RCE vulnerability found in OpenPLC

1 year ago

Cisco’s Talos reported critical and high-severity flaws in OpenPLC that could lead to DoS condition and remote code execution. Cisco’s…

China-linked APT group Salt Typhoon compromised some U.S. internet service providers (ISPs)

1 year ago

China-linked threat actors compromised some U.S. internet service providers (ISPs) as part of a cyber espionage campaign code-named Salt Typhoon.…

Privacy non-profit noyb claims that Firefox tracks users with privacy preserving feature

1 year ago

Privacy non-profit noyb filed a complaint with the Austrian DPA against Firefox for enabling tracking in Firefox without user consent.…

Data of 3,191 congressional staffers leaked in the dark web

1 year ago

The personal information of over 3,000 congressional staffers was leaked on the dark web following a major cyberattack on the…

New variant of Necro Trojan infected more than 11 million devices

1 year ago

Experts warn of Necro Trojan found in Google Play, threat actors are spreading it through fake versions of legitimate Android…

U.S. CISA adds Ivanti Virtual Traffic Manager flaw to its Known Exploited Vulnerabilities catalog

1 year ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Virtual Traffic Manager vulnerability to its Known Exploited Vulnerabilities catalog. The…

Arkansas City water treatment facility switched to manual operations following a cyberattack<gwmw style="display: none; background-color: transparent;"></gwmw>

1 year ago

Arkansas City, a small city in Cowley County, Kansas, was forced to switch its water treatment facility to manual operations…

New Android banking trojan Octo2 targets European banks

1 year ago

A new version of the Android banking trojan Octo, called Octo2, supports improved features that allow to takeover infected devices.…

A generative artificial intelligence malware used in phishing attacks

1 year ago

HP researchers detected a dropper that was generated by generative artificial intelligence services and used to deliver AsyncRAT malware. While investigating…

This website uses cookies.