CD Projekt Red game maker discloses ransomware attack

5 years ago

The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware…

Adobe fixes a buffer overflow issue in Reader which is exploited in the wild

5 years ago

Adobe released security patches for 50 flaws affecting six products, including a zero-day flaw in Reader that has been exploited in…

Microsoft February 2021 Patch Tuesday fixes 56 bugs, including an actively exploited Windows zero-day

5 years ago

Microsoft February 2021 Patch Tuesday addresses 56 vulnerabilities, including a flaw that is known to be actively exploited in the…

Ukraine’s police arrested the author of the U-Admin phishing kit

5 years ago

An international operation conducted by Ukraine's police, along with the US and Australia peers, shut down the world's largest phishing…

Critical flaws in NextGen Gallery WordPress plugin still impact over 500K installs

5 years ago

The development team behind the NextGen Gallery plugin has addressed two severe CSRF vulnerabilities that could have allowed site takeover.…

Microsoft to notify Office 365 users of nation-state attacks

5 years ago

Microsoft implements alerts for 'nation-state activity' in the Defender for Office 365 dashboard, to allow organizations to quickly respond. Since…

Hackers attempted to poison the water supply of a US city

5 years ago

Pinellas Sheriff revealed that attackers tried to raise levels of sodium hydroxide, by a factor of more than 100, in…

Google launches Open Source Vulnerabilities (OSV) database

5 years ago

Google announced the launch of OSV (Open Source Vulnerabilities), a vulnerability database and triage infrastructure for open source projects. Google…

Domestic Kitten has been conducting surveillance targeting over 1,000 individuals

5 years ago

Iran-linked APT group Domestic Kitten, also tracked as APT-C-50, has been conducting widespread surveillance targeting over 1,000 individuals. Domestic Kitten,…

Novel phishing technique uses Morse code to compose malicious URLs

5 years ago

Cybercriminals devised a new phishing technique that leverages the Morse code to hide malicious URLs and bypass defense. Experts spotted…

This website uses cookies.