Experts from Cisco’s Talos team released a free decryption tool for the Thanatos ransomware to recover the files without paying the ransom.…
Seven months ago, security experts discovered a critical file deletion vulnerability that affects all WordPress versions, currently, the issue is…
A security breach suffered by the Hotel booking software provider FastBooking has affected hundreds of hotels worldwide. The Hotel booking…
Security researchers at Palo Alto Networks have uncovered a new cyber espionage group tracked as RANCOR that has been targeting entities…
The Ministry of Internal Affairs of the Russian Federation and Group-IB have detained cybercriminals who broke into the accounts of…
The Wi-Fi Alliance announced late on Monday the launch of the WPA3 security standard that promises to increase the Wi-Fi security.…
Trend Micro experts reported the Necurs botnet has been using Internet Query (IQY) files in recent spam campaigns to bypass…
Security Researchers demonstrated how a "poisoned" cellphone battery in smartphones can be leveraged to "infer characters typed on a touchscreen We've…
Several websites using the misconfigured Java web server component Jolokia, including those operated by financial organizations. are exposed to cyber…
Security researchers at AlienVault uncovered a series of cyber attacks on cryptocurrency exchanges leveraging weaponized Hangul Word Processor HWP documents…
This website uses cookies.