European police arrested tens of members of two SIM Hijacking Gangs

6 years ago

European authorities dismantled two cybercrime organizations responsible for stealing millions through SIM hijacking. European authorities managed to dismantle the operations…

VMware fixes a critical bug in Workstation, Fusion that allows code execution on host From guest

6 years ago

VMware has fixed three serious flaws in its products, including a critical issue in Workstation and Fusion that allow code…

Cookiethief, the Android malware that hijacks Facebook accounts

6 years ago

Experts discovered an Android Trojan, dubbed Cookiethief, that is able to gain root access on infected devices and hijack Facebook…

State-sponsored hackers are launching Coronavirus-themed attacks

6 years ago

In the last weeks, security experts reported many Coronavirus-themed attacks carried out by cybercrime gangs, now experts warn of similar…

Flaws in the Popup Builder WordPress plugin expose 100K+ websites to hack

6 years ago

Flaws in the Popup Builder WordPress plugin could allow unauthenticated attackers to inject malicious JavaScript code into popups of 100K+…

Russia-Linked Turla APT uses new malware in watering hole attacks

6 years ago

The Russia-linked APT group Turla employed two new pieces of malware in attacks launched over a period of roughly two…

Microsoft fixes CVE-2020-0796, the SMBv3 wormable bug recently leaked

6 years ago

Microsoft released security updates to fix a recently disclosed CVE-2020-0796 vulnerability in SMBv3 protocol that could be abused by wormable malware.…

Card data stole from the Volusion security breach surfaces on the dark web

6 years ago

Security experts have discovered that card data stolen last year from Volusion-hosted online stores is now available for sale on…

Experts disclose tens of flaws in Zyxel Cloud CNM SecuManager, includes dangerous backdoors

6 years ago

Flaws Riddle Zyxel’s Network Management Software Experts have found tens of security vulnerabilities in Zyxel Network Management Software, including backdoors…

Hacking a network, using an ‘invisibility cloak’ – Is it that simple?

6 years ago

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into…

This website uses cookies.