Researchers observed a spike in the number of cyber-attacks targeting Singapore during the Trump-Kim Summit, from June 11 to June 12. Researchers at F5…
Trend Micro spotted a new attack relying on weaponized Word documents and PowerShell scripts that appears related to the MuddyWater APT. Security…
A new vulnerability involving side channel speculative execution on Intel chips, known as LazyFP, has been announced and assigned CVE-2018-3665.…
Threat Fabric reports of a newly discovered banking Trojan, dubbed Mysterybot, targeting Android 7 and 8 versions, the malware seems to…
Researchers have released a decryptor tool that could be used by victims of the Everbe Ransomware to decrypt their files for…
GnuPG 2.2.8 released earlier this month addresses the CVE-2018-12020 vulnerability, dubbed SigSpoof, affecting GnuPG, Enigmail, GPGTools, and python-gnupg. GnuPG, also known as GPG, is a…
SAP June 2018 Security Patch Day addresses two security notes, the company fixed five issues for previously released notes, including two…
According to a top US intelligence official, mobile phones of football fans traveling to Russia for the World Cup could…
76. Calls on the EU to perform a comprehensive review of software, IT and communications equipment and infrastructure used in…
Cyber criminal organizations and state-sponsored hackers continue to use Exploit kits to compromise targets world worldwide if the use of…
This website uses cookies.