The US DHS and the FBI have issued a warning that APT groups are actively targeting energy firms and critical…
An NSA leaked document about the BADDECISION hacking tool raises the doubt about National Security Agency knew the Krack attack…
The dreaded Proton malware was spreading through a new supply-chain attack that involved the Elmedia apps, victims should wipe their…
Operators behind Locky ransomware campaigns have switched to new attack techniques to evade detection leveraging the DDE protocol. Security experts are continuing to observe…
Malware researchers at Check Point have uncovered a new massive IoT botnet that presented many similarities with the dreaded Mirai. The…
Some kid smartwatches available for sale in Europe pose security and privacy risks, including potentially allowing hackers to take control…
Google has launched Google Play Security Reward, the bug bounty program that will pay $1,000 rewards for flaws in popular…
Cisco patched critical and high severity vulnerabilities in several products, including the Cloud Services Platform (CSP). Cisco patched critical and…
Threat actors in the wild are mass-scanning websites for directories containing SSH private keys to hack them. The SSH allows a…
Microsoft’s Offensive Security Research (OSR) team disclosed a remote code execution vulnerability in the Chrome web browser. Microsoft’s Offensive Security Research…
This website uses cookies.