Hackers leaked the Snapchat source code on GitHub, after they attempted to contact the company for a reward. Hackers gained…
Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as 'Black' botnet, created by Ramnit operators. Security…
A security researcher has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most…
TSMC shared further details on the attack and confirmed that its systems were infected with a variant of the infamous WannaCry ransomware. Early…
Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be…
Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts…
HP has released firmware updates that address two critical remote code execution vulnerabilities in some models of inkjet printers. HP…
DoE announced the Liberty Eclipse exercise to test the electrical grid 's ability to recover from a blackout caused by…
A security researcher discovered a new crypto mining worm dubbed ZombieBoy that leverages several exploits to evade detection. The security researcher James Quinn…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…
This website uses cookies.