Experts found a bug in Apple's wireless file-sharing protocol Apple AirDrop that could expose user's contact information. Boffins from the…
European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows…
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts…
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another…
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information…
A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently…
During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting…
Personal and Corporate data is now regularly targeted and traded by unscrupulous actors, protect it with a proactive Cyber Defense…
This website uses cookies.