According to Kaspersky, the PC was hacked after the NSA employee installed a backdoored key generator for a pirated copy…
We at the CSE Cybsec ZLab have conducted a preliminary analysis of the Bad Rabbit ransomware discovering interesting aspects of the attack. This…
The Financial details of some of the world's richest people are set to be published after the Offshore Legal Firm Appleby…
DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions…
A new strain of malware dubbed Bad Rabbit ransomware has been found rapidly spreading in Russia, Ukraine and elsewhere. A…
Introduction Out of the five main information security pillars, namely confidentiality, integrity, availability, authenticity and irrefutability, common users give more…
APNIC Deputy Director General Sanjaya confirmed that Whois data were accidentally exposed online included authentication details. The Asia-Pacific Network Information…
A security researcher discovered a number of embarrassing vulnerabilities in the popular anonymous feedback app Sarahah. The anonymous feedback app…
According to the Whole Foods Market, crooks may have stolen payment cards at taprooms and full table-service restaurants at nearly…
Russian cyber espionage group APT28 targeted individuals with spear-phishing messages using documents referencing a NATO cybersecurity conference. Researchers with Cisco Talos have…
This website uses cookies.