"Torus" a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes…
The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the…
A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI…
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…
US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…
The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always…
An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and…
Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry…
New revelations came after a high-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could…
Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code…
This website uses cookies.