hacking news

Cyber Defense Magazine – November 2021 has arrived. Enjoy it!

Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with 155 pages of excellent…

4 years ago

NSO Group, Positive Technologies and other firms sanctioned by the US government

The U.S. sanctioned four companies for the development of surveillance malware or the sale of hacking tools used by nation-state…

4 years ago

Cybercrime underground flooded with offers for initial access to shipping and logistics orgs

Experts warn of the availability in the cybercrime underground of offers for initial access to networks of players in global…

4 years ago

BlackMatter ransomware gang is shutting down due to pressure from law enforcement

The BlackMatter ransomware gang announced it is going to shut down its operation due to pressure from law enforcement. The…

4 years ago

Google fixes actively exploited Zero-Day Kernel flaw in Android

Google’s Android November 2021 security updates address a zero-day vulnerability in the Kernel that is actively exploited in the wild.…

4 years ago

Facebook is going to shut down Face Recognition system and data it collected

Facebook announced to shut down its Face Recognition system and is going to delete over 1 billion people's facial recognition…

4 years ago

Ransomware gangs target companies involved in time-sensitive financial events, FBI warns

The FBI warns of ransomware attacks on businesses involved in "time-sensitive financial events" such as corporate mergers and acquisitions. The Federal…

4 years ago

Google triples bounty for new Linux Kernel exploitation techniques

Google is going to increase the bounty for finding and exploiting privilege escalation vulnerabilities in the Linux kernel. Good news…

4 years ago

50% of internet-facing GitLab installations are still affected by a RCE flaw

Researchers warn of a now-fixed critical remote code execution (RCE) vulnerability in GitLab 's web interface actively exploited in the…

4 years ago

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called 'Trojan Source' that allows hide vulnerabilities into the source code of a software…

4 years ago

This website uses cookies.