Security Affairs

Why hackers target background investigation databases

Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is…

11 years ago

Macros based malware on the rise (Once Again)

Microsoft is observing a major spike in the volume of malware using macros since the beginning of the year. The…

11 years ago

Security Affairs newsletter Round 6 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

Hacking telesurgery robots, a concrete risk

Security experts have conducted an experimental to analyze cyber security threats against teleoperated surgical robots in telesurgery. Technology will help…

11 years ago

The CozyDuke, the last Russian APT group

Kaspersky Lab discovered another APT group dubbed CozyDuke which is believed to have hacked the US Department of State and…

11 years ago

APT28 Russian hackers exploited two zero-day flaws in the wild

FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government…

11 years ago

Security Affairs newsletter Round 4 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

A severe arbitrary code execution in BitTorrent Sync affects various products

A security expert has discovered a severe vulnerability in BitTorrent Sync that can be exploited by a remote attacker to…

11 years ago

The Turkish Government banned YouTube, Facebook and Twitter

The Turkish Government has blocked the access to YouTube, Facebook and Twitter in the country over Istanbul prosecutor siege images.…

11 years ago

A researcher discovered two security issues in the GITHUB platform

A security researcher discovered a couple of security issues on GitHub platform explaining how it is possible to exploit them…

11 years ago

This website uses cookies.