Crooks increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites.…
A new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone maker Gigaset to…
Not only the European Commission, but many other organizations of the European Union have been targeted by a cyberattack in…
On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm…
China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam.…
Security researcher implemented a service to verify if your mobile number is included in the recent Facebook data leak. Security…
Experts discovered a vulnerability in the popular CMS Umbraco that could allow low privileged users to escalate privileges to "admin."…
Rockwell Automation has recently addressed nine critical vulnerabilities in its FactoryTalk AssetCentre product with the release of version v11. The…
You can check if your personal information is included in the Facebook data leak by querying the data breach notification…
H2 2020 - Kaspersky observed an increase in ransomware attacks on industrial control system (ICS) systems in developed countries. Cybersecurity…
This website uses cookies.