Experts uncovered a new cyber-espionage campaign, dubbed "Operation In(ter)reception," aimed at aerospace and military organizations in Europe and the Middle…
Adobe addressed 18 critical code execution flaws in After Effects, Illustrator, Premiere Pro, Premiere Rush, and Audition products. Adobe addressed 18…
A CIA elite hacking unit that developed cyber-weapons failed in protecting its operations, states an internal report on the Vault…
A database allegedly belonging to Ariix Italia was exposed online on an unsecured Amazon S3 bucket, it includes 30,000+ Italian sales…
Serious security vulnerabilities in the Treck TCP/IP stack dubbed Ripple20 expose millions of IoT devices worldwide to cyber attacks, researchers…
Oracle addressed two flaws in E-Business Suite solution that can be exploited by attackers to tamper with an organization’s financial…
Wireless carrier T-Mobile suffered a major outage in the United States, that impacted service at other carriers, due to a…
Norway's health authorities announced the suspension of the design of a COVID-19 contact tracing app due to privacy concerns. In…
Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G…
Black Kingdom ransomware operators are targeting organizations using unpatched Pulse Secure VPN software to deploy their malware. Researchers from security…
This website uses cookies.