Hackers target Windows users exploiting a Zero-Day in Reader

5 years ago

Adobe confirmed that a zero-day vulnerability affecting Adobe Reader for Windows has been exploited in the wild in limited attacks.…

Researcher hacked Apple AirTag two weeks after its launch

5 years ago

Apple AirTag has been launched less than two weeks ago, but a security researcher already claims to have hacked them.  The Apple…

Apple was aware that XcodeGhost impacted 128 Million iOS Users in 2015

5 years ago

Court documents revealed that the infamous XcodeGhost malware, which has been active since 2015, infected 128 million iOS users. Documents provided in…

Google open sources cosign tool for verifying containers

5 years ago

Google has released a new open-source tool called cosign that could allow administrators to sign and verify the container images.…

FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks

5 years ago

The FBI and Australian Australian Cyber Security Centre (ACSC) warn of an ongoing Avaddon ransomware campaign targeting organizations worldwide. The…

FBI confirmed that Darkside ransomware gang hit Colonial Pipeline

5 years ago

The U.S. FBI confirmed that the attack against the Colonial Pipeline over the weekend was launched by the Darkside ransomware…

City of Tulsa, is the latest US city hit by ransomware attack

5 years ago

The city of Tulsa, Oklahoma, has been hit by a ransomware attack over the weekend that impacted its government’s network…

Threat actors added thousands of Tor exit nodes to carry out SSL stripping attacks

5 years ago

Since early 2020, bad actors have added Tor exit nodes to the Tor network to intercep traffic to cryptocurrency-related sites…

WhatsApp will not deactivate accounts for not accepting new privacy terms

5 years ago

WhatsApp will not deactivate the accounts of users who don't accept the new privacy policy update that requires sharing data…

CISA MAR report provides technical details of FiveHands Ransomware

5 years ago

U.S. CISA has published an analysis of the FiveHands ransomware, the same malware that was analyzed a few days ago…

This website uses cookies.