A security researcher has found a serious vulnerability in a building automation product from Sauter AG that could be exploited to steal…
USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published…
PortSmash side-channel flaw that could be exploited with a timing attack to steal information from other processes running in the…
According to the Symantec experts, the group behind the SamSam ransomware has continued to launch attacks against organizations during 2018. Security…
Cybercriminals offered for sale private messages from at least 81,000 Facebook accounts claiming of being in possession of data from…
A cyber attack on a French firm Ingerop allowed attackers to access confidential documents related to nuclear power plant plans…
Security experts from CISCO warn of a zero-day vulnerability that is being actively exploited in attacks in the wild. The flaw,…
According to the New York Times, FIFA has suffered the second hack in a year, new documents are set to…
Two vulnerabilities in new Bluetooth chip, dubbed BLEEDINGBIT expose millions of access points and other networking devices to remote attacks. Security…
Security experts from Cisco Talos have uncovered two recent sextortion scam campaigns that appear to leverage on the Necurs botnet…
This website uses cookies.