Society's dependence on internet-based technologies means security professionals must defend against cyberattacks as well as more traditional threats, such as…
Another day another illustrious victim of the data breach, the popular question-and-answer website Quora suffered a major data breach that…
Russia-linked cyber-espionage group Sofacy, (aka APT28, Pawn Storm, Fancy Bear, Sednit, Tsar Team, and Strontium) use BREXIT lures in recent attacks. The APT group used Brexit-themed bait documents on…
Security experts at HackenProof are warning Open Elasticsearch instances expose over 82 million users in the United States. Experts from HackenProof…
New Zealand intelligence agency asked mobile company Spark to avoid using Huawei equipment for 5G infrastructure. According to New Zealand's Government…
The TheHackerGiraffe used the Printer Exploitation Toolkit (PRET) to hijack +50k vulnerable printers to Promote PewDiePie YouTube Channel. An anonymous hacker hijacked over…
Two days after Moscow opened a new cable car system hackers infected its computer systems with ransomware. The cable car system…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…
The MITRE Corporation’s ATT&CK framework has been used to evaluate the efficiency of several enterprise security products designed by several…
Security researchers at Trend Micro recently discovered PowerShell-based backdoor that resembles a malware used by MuddyWater threat actor. Malware researchers at Trend…
This website uses cookies.