Cathay Pacific has admitted that it was under attack for three months and it took six months to disclose the…
Google services were partially inaccessible on Monday due to a BGP leak that caused traffic redirection through Russia, China, and…
David Wells, a security expert from Tenable, devised a method to bypass Windows’ User Account Control (UAC) by spoofing the…
The author of an IoT botnet is distributing a backdoor script for ZTE routers that also includes his own backdoor…
According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to…
The French government announced a "Paris Call" for global talks about cyberspace security aimed at laying out a shared framework…
A critical security vulnerability affects a GDPR compliance plugin for WordPress has been already exploited in the wild to take…
Crooks are exploiting the popularity of Elon Musk and a series of hacked verified Twitter accounts to implement a new fraud scheme.…
Experts at Volexity discovered that a recently patched remote code execution flaw (CVE-2018-15961) affecting the Adobe ColdFusion has been exploited in the…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…
This website uses cookies.