Experts found two critical zero-day flaws in the Foxit PDF Reader that could be exploited by attackers to execute arbitrary…
Ourmine hacker crew hijacked the official Twitter and Facebook accounts for Sony PlayStation Network (PSN) on Sunday and claims to…
The bad actors behind the HBO hack are back and are threatening to leak the final episode of the seventh…
Enigma platform hacked - Another cyber heist made the headlines, this time an unknown hacker has stolen more than $471,000…
A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and…
A new strain of ransomware distributed through spam emails, dubbed SyncCrypt, hides its components inside harmless-looking images. A new strain of ransomware recently discovered, dubbed SyncCrypt, hides its…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. · Anti-Israel…
Learning About ISIS Intentions Using Open Source Intelligence - How terrorists are exploiting technology for propaganda and radicalization. ISIS' weekly newsletter…
Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components that are replaced. According to a…
Analysts at Global Intelligence Insight analyzed the recent Barcelona terrorist attack linking it to the content shared recently in the Jihadist…
This website uses cookies.