Experts recently discovered a multi-platform ransomware, dubbed Tycoon Ransomware, that uses a Java image file (JIMAGE) to evade detection. Experts…
Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 165 pages of…
Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign…
A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from…
North Atlantic Council issued a statement warning of concerning malicious cyber activities against entities involved in the fight against COVID-19.…
Researchers from Cisco Talos disclosed two critical flaws in the Zoom software that could have allowed attackers to hack into the systems…
Tor Browser 9.5 includes important security updates to Firefox, users on desktop will be able to opt-in for using onion sites automatically…
Several flaws in the Exim mail transfer agent (MTA) have been exploited by Russia-linked hackers, hundreds of thousands of servers…
A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact…
Last week a massive distributed denial-of-service (DDoS) attack shut down the websites and systems of Minneapolis, but there is no…
This website uses cookies.