A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…
Vulnerabilities in Fredi Wi-Fi baby monitor could be exploited by a remote unauthenticated attacker to control it and spy on…
A security researcher has devised a method to brute force a passcode on every Apple iPhone or iPad, even the…
SWIFT hackers continue to target banks worldwide, the last string of attacks hit financial institutions across Latin America. According to…
A flaw in the Edge browser, dubbed Wavethrough, addressed by latest Microsoft Patch Tuesday for June 2018 could be exploited to read…
Crooks are attempting to exploit a recently patched Drupal vulnerability, tracked as CVE-2018-7602, to drop Monero mining malware onto vulnerable systems. The…
Security experts from AlienVault have spotted a new piece of malware named GZipDe that was used in a cyber-espionage campaign. GZipDe…
According to researchers at Trustwave, the source code of the Red Alert 2.0 Android Trojan is now available for rent on cybercrime underground…
Connectivity and functionality may offer us convenience, but as with any new connected technology like smart speakers also come with…
Cisco released security patches for more than 30 vulnerabilities, including five Critical arbitrary code execution issues affecting the NX-OS Software…
This website uses cookies.