The Europol coordinated the Operation Daylight against criminals that were sharing child sex images on the internet, 75 suspects have…
Security researchers discovered a new Linux Trojan dubbed Linux.Rex.1 that is capable of self-spreading and create a peer-to-peer botnet. A…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in…
Dear Readers, today I want to present you Dêfãult Vírüsa one of the most intriguing hackers on the Internet. He…
Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against…
The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on…
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
Experts from Dr Web discovered a new PoS malware dubbed Kasidet that can bypass User Account Control (UAC) by posing…
This website uses cookies.