Bella Thorne is the last victim of a sextortion attack, in a case similar to the Fappening saga, a hacker…
Operators behind the Echobot botnet added new exploits to infect IoT devices, and also enterprise apps Oracle WebLogic and VMware…
On Friday, security experts at Microsoft warned of a new Linux worm, spreading via Exim email servers, that already compromised…
Bug hunter Thomas Orlita discovered an XSS vulnerability in Google's Invoice Submission Portal that would have allowed attackers access to…
Cybercriminals are attempting to exploit an API misconfiguration in Docker containers to infiltrate them and run the Linux bot AESDDoS.…
Experts at Dragos firm reported that Xenotime threat actor behind the 2017 Trisis/Triton malware attack is targeting electric utilities in…
Mozilla released security updates for the Thunderbird email client that address vulnerabilities that could allow code execution on impacted systems. …
Good news for the victims of the pyLocky Ransomware versions 1 and 2, French authorities have released the pyLocky decryptor…
The Cybaze-Yoroi ZLab analyzed a new sample of Nanocore Remote Administrator Tools (RAT) using a Delphi wrapper to protect its code. Introduction…
Yubico is replacing YubiKey FIPS security keys due to a serious flaw that makes cryptographic operations easier to crack under…
This website uses cookies.