Key Ring digital wallet exposes data of 14 Million users in data leak

6 years ago

vpnMentor researchers discovered that the popular digital wallet application Key Ring exposed data belonging to millions of users in a…

DarkHotel APT uses VPN zero-day in attacks on Chinese government agencies

6 years ago

DarkHotel nation-state actor is exploiting a VPN zero-day to breach Chinese government agencies in Beijing and Shanghai Chinese security-firm Qihoo…

Russian telco Rostelecom hijacks traffic for IT giants, including Google, Amazon and Facebook

6 years ago

Russian telco operator Rostelecom was involved in BGP hijacking incident that impacted hundreds of CDNs and cloud providers last week.…

Hackers target Docker servers to deploy the new Kinsing cryptocurrency miner

6 years ago

Experts uncovered a hacking campaign that is breaching Docker clusters to deploy a new crypto-mining malware tracked as Kinsing. Cloud…

Popular OGUsers hacking forum breached for the second time in a year

6 years ago

OGUsers, one of the most popular hacking forums, was hacked again, it is the second security breach it has suffered…

Experts uncovered hidden behavior in thousands of Android Apps

6 years ago

A group of security researchers has found thousands of Android apps containing hidden backdoors and blacklists. Researchers from The Ohio…

Coronavirus-themed attacks March 29 – April 04, 2020

6 years ago

In this post, I decided to share the details of the Coronavirus-themed attacks launched from March 29 to April 04,…

Security Affairs newsletter Round 258

6 years ago

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Coronavirus-themed attacks March…

New Coronavirus-themed campaign spread Lokibot worldwide

6 years ago

Researchers spotted a new Coronavirus-themed attack, the messages pretend to be sent from the World Health Organization to deliver Lokibot…

Firefox 74.0.1 addresses two zero-days exploited in the wild

6 years ago

Mozilla releases Firefox version 74.0.1 to address two vulnerabilities exploited by threat actors in attacks in the wild, users should…

This website uses cookies.