Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated…
Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to…
A group of boffins discovered vulnerabilities in the reCaptcha systems of Google and Facebook and devised an attack method. The…
Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135…
iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to…
According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD) database is open…
A flaw in the family of CISCO FirePower Firewall devices allows malware to bypass detection mechanism. Cisco is releasing security…
A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a…
The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to…
Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two…
This website uses cookies.