Security loopholes on social marketplace website trustanduse.com exposed data of around 439,000 users including many businesses for at least six…
Cybersecurity firm Resecurity published report on drug trafficking marketplaces currently operating in the Dark Web Resecurity, a Los Angeles-based cybersecurity…
Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data…
Google’s Threat Analysis Group (TAG) linked three exploitation frameworks to a Spanish surveillance spyware vendor named Variston. While tracking the…
Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
I’m proud to announce the release of the 10th edition of the ENISA Threat Landscape (ETL) on the state of…
I'm deeply saddened by the absurd death of Vitali Kremez, he died during a scuba diving off the coast of…
The Hive ransomware gang, which claimed the responsibility for the Tata Power data breach, started leaking data. On October 14,…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
This website uses cookies.