Security Affairs

Security Affairs newsletter Round 115 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Critical…

9 years ago

CISCO Prime Data Center Network Manager affected by two critical flaws

Cisco èiblished two security advisories to warn customers of the presence of two critical vulnerabilities in the CISCO Prime Data…

9 years ago

Comey hearing: Former FBI director talks about Russia interference in US Presidential Election

Former FBI Director Comey hearing: Comey Has 'No Doubt' on the Russia's Involvement in cyber attacks against 2016 US Presidential…

9 years ago

The Active Cyber Defense Certainty Act Makes Hacking Back Anything But “Certain”

Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active…

9 years ago

A new report warns UK’s Trident submarines ‘vulnerable to catastrophic hack’

According to a report published by the London-based think tank Basic, the UK Trident submarines are vulnerable to cyber-attacks. According…

9 years ago

Security Affairs newsletter Round 113 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      British…

9 years ago

Security Affairs newsletter Round 112 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Google…

9 years ago

Tainted Leaks – Widespead Russia’s disinformation campaign hit 39 Countries

Researchers at Citizen Lab documented a Russia's campaign of cyberespionage and disinformation that leveraged tainted leaks. According to the researchers…

9 years ago

Master Keys for Crysis ransomware released on a forum

Researchers at ESET security firm have discovered that someone has released 200 master keys for the latest variants of the…

9 years ago

The NAND Busters Data Storage Chips Vulnerable to Attack

Experts found that NAND Data Storage Chips are vulnerable to malicious programs which can corrupt data and even destroy them…

9 years ago

This website uses cookies.