Microsoft secured court order to take down domains used in BEC campaign

5 years ago

Microsoft has seized 17 malicious homoglyph domains used by crooks in a business email compromise (BEC) campaign targeting its users. Microsoft's Digital…

WiFiDemon – Recently discovered iPhone Wi-Fi bug could also allow RCE

5 years ago

A recently discovered iPhone Wi-Fi bug that could crash the WiFi connectivity could be exploited by attackers to achieve remote…

US DoJ indicts four members of China-linked APT40 cyberespionage group

5 years ago

US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and…

Experts disclose critical flaws in Advantech router monitoring tool

5 years ago

Cisco Talos experts disclose details of several critical flaws in a router monitoring application developed by industrial and IoT firm…

Threat actor claims to have stolen 1 TB of data belonging to Saudi Aramco

5 years ago

A hacker claims to have stolen 1 TB of sensitive data from the Saudi Arabian petroleum and natural gas giant,…

Pegasus Project – how governments use Pegasus spyware against journalists

5 years ago

Pegasus Project investigation into the leak of 50,000 phone numbers of potential surveillance targets revealed the abuse of NSO Group's…

Experts show how to bypass Windows Hello feature to login on Windows 10 PCs

5 years ago

Security researchers demonstrated how to bypass the Windows Hello facial recognition that is used in Windows 10 as a login…

Chinese government issues new vulnerability disclosure regulations

5 years ago

Cyberspace Administration of China (CAC) issued new vulnerability disclosure regulations that oblige experts to report zero-days to the government. The…

Instagram implements ‘Security Checkup’ to help users recover compromised accounts

5 years ago

Instagram introduced a new security feature dubbed "Security Checkup" to help users to recover their accounts that have been compromised.…

HelloKitty ransomware gang targets vulnerable SonicWall devices

5 years ago

BleepingComputer became aware that the recent wave of attacks targeting vulnerable SonicWall devices was carried out by HelloKitty ransomware operators.…

This website uses cookies.