Hackers have infected with a piece of malware some IoT devices running Windows 7 designed by three of the world’s…
The social network giant Facebook is still the target of hackers, its Facebook and Instagram accounts have been hijacked by…
Group-IB experts detected a database containing over 460,000 payment card records uploaded to Joker’s Stash cardshops, most of records were…
The operators behind the infamous RobbinHood ransomware are exploiting a vulnerable GIGABYTE driver to kill antivirus products. Cybercriminals behind the RobbinHood…
Japanese defense contractors Pasco and Kobe Steel have disclosed security breaches that they have suffered back in 2016 and 2018.…
Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user…
A set of vulnerabilities in the Cisco Discovery Protocol (CDP) exposes tens of millions of devices to the risk of…
Check Point experts discovered a high-severity flaw in Philips Hue Smart Light Bulbs that can be exploited to gain entry into a…
Researcher published details about a backdoor mechanism he found in HiSilicon chips, but he did not report it to the…
File hosting service company Dropbox paid out $1 million for vulnerabilities reported by researchers through its bug bounty program. Since…
This website uses cookies.