Victims of ThunderX ransomware can recover their files for free

6 years ago

Good news for the victims of the ThunderX ransomware, cybersecurity firm Tesorion has released a decryptor to recover their files…

Hackers stole more than $150 million from KuCoin cryptocurrency exchange

6 years ago

Singapore-based cryptocurrency exchange KuCoin disclosed a security breach, hackers stole $150 million from its hot wallets. Singapore-based cryptocurrency exchange KuCoin…

Source Code of Windows XP, Server 2003 leaked

6 years ago

The source code for Microsoft's Windows XP and Windows Server 2003 operating systems was published as a torrent file on…

Twitter warns developers of possible API keys leak

6 years ago

Twitter is warning developers that their API keys, access tokens, and access token secrets may have been exposed in a…

Cisco fixes 34 High-Severity flaws in IOS and IOS XE software

6 years ago

Cisco patched 34 high-severity flaws affecting its IOS and IOS XE software, some of them can be exploited by a…

Fortinet VPN with default certificate exposes 200,000 businesses to hack

6 years ago

According to SAM Seamless Network, over 200,000 businesses are using Fortigate VPN with default settings, exposing them to the risk…

CISA says federal agency compromised by malicious cyber actor

6 years ago

Cybersecurity and Infrastructure Security Agency (CISA) revealed that a hacker breached a US federal agency and exfiltrated data. Cybersecurity and…

Polish police shut down major group of hackers in the country

6 years ago

Polish police dismantled a major group of hackers that was behind several criminal activities, including ransomware attacks, and banking fraud.…

Alien Android banking Trojan, the powerful successor of the Cerberus malware

6 years ago

Security researchers spotted a new strain of Android malware, dubbed Alien, that implements multiple features allowing it to steal credentials…

Instagram RCE gave hackers remote access to your device

6 years ago

Facebook has addressed a critical vulnerability in Instagram that could lead to remote code execution and turn the smartphone into…

This website uses cookies.