Malicious dropper apps on Play Store totaled 30.000+ installations

3 years ago

ThreatFabric researchers discovered five malicious dropper apps on Google Play Store with more than 130,000 downloads. Researchers at ThreatFabric have…

Former British Prime Minister Liz Truss ‘s phone was allegedly hacked by Russian spies

3 years ago

According to the Daily Mail, Former British Prime Minister Liz Truss 's personal phone was hacked by Russian spies. The…

German BKA arrested the alleged operator of Deutschland im Deep Web darknet market

3 years ago

German police arrested a student that is suspected of being the administrator of 'Deutschland im Deep Web' (DiDW) darknet marketplace.…

BlackByte ransomware group hit Asahi Group Holdings, a precision metal manufacturing and metal solution provider

3 years ago

The BlackByte ransomware group claims to have compromised Asahi Group Holdings, a precision metal manufacturing and metal solution provider. Asahi Group…

Air New Zealand warns of an ongoing credential stuffing attack

3 years ago

Air New Zealand suffered a security breach, multiple customers have been locked out of their accounts after the incident. Air…

Security Affairs newsletter Round 391

3 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

Twilio discloses another security incident that took place in June

3 years ago

Twilio suffered another brief security incident in June 2022, the attack was conducted by the same threat actor of the August hack.…

A massive cyberattack hit Slovak and Polish Parliaments

3 years ago

The Slovak and Polish parliaments were hit by a massive cyber attack, and the voting system in Slovakia's legislature was…

How will Twitter change under Elon Musk?

3 years ago

Cybhorus CEO Pierluigi Paganini talks to TRT World about Elon Musk completing his $44 billion deal to buy Twitter and…

Multiple vulnerabilities affect the Juniper Junos OS

3 years ago

Juniper Networks devices are affected by multiple high-severity issues, including code execution vulnerabilities. Multiple high-severity security vulnerabilities have been discovered…

This website uses cookies.