Cybersecurity

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple's wireless file-sharing protocol Apple AirDrop that could expose user's contact information. Boffins from the…

5 years ago

Bye Bye Emotet, law enforcement pushed the uninstall code via the botnet

European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows…

5 years ago

Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws

Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts…

5 years ago

A supply chain attack compromised the update mechanism of Passwordstate Password Manager

The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another…

5 years ago

Hackers are targeting Soliton FileZen file-sharing servers

Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government…

5 years ago

Security Affairs newsletter Round 311

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

5 years ago

Privacy and security in the software designing

The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information…

5 years ago

Firmware attacks, a grey area in cybersecurity of organizations

A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently…

5 years ago

EU leaders aim at boosting defense and security, including cybersecurity

During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting…

5 years ago

The Importance of a Proactive Cyber Defense Solution To Protect Your Critical Data

Personal and Corporate data is now regularly targeted and traded by unscrupulous actors, protect it with a proactive Cyber Defense…

5 years ago

This website uses cookies.