The number of crypto mining scripts discovered by security experts continues to increase, especially those ones illegally deployed by hacking servers…
Thousands of websites worldwide hijacked by a cryptocurrency mining code due to the hack of the popular Browsealoud plugin. A…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…
Hackers are exploiting the CVE-2018-0101 CISCO ASA flaw in attacks in the wild and a Proof-of-concept exploit code is available online. This…
Russian authorities have arrested some employees at the Russian Federation Nuclear Center facility because they are suspected for trying to…
Buying or selling goods through online auctions is more popular than ever. Which are the best practices to follow for…
According to a security advisory issued by Lenovo, two critical vulnerabilities in Broadcom chipsets affects at least 25 models of Lenovo ThinkPad. The affected…
VMware has provided detailed instruction on how to mitigate the Meltdown and Spectre vulnerabilities in several of its products. VMware…
The group of hackers known as 'fail0verflow' has discovered a vulnerability in the gaming console Nintendo Switch that could be…
Security expert Paulos Yibelo has discovered a vulnerability in Hotspot Shield VPN from AnchorFree that can expose locations of the…
This website uses cookies.