The social network giant Facebook is still the target of hackers, its Facebook and Instagram accounts have been hijacked by…
Group-IB experts detected a database containing over 460,000 payment card records uploaded to Joker’s Stash cardshops, most of records were…
The operators behind the infamous RobbinHood ransomware are exploiting a vulnerable GIGABYTE driver to kill antivirus products. Cybercriminals behind the RobbinHood…
Japanese defense contractors Pasco and Kobe Steel have disclosed security breaches that they have suffered back in 2016 and 2018.…
Iran-linked APT group Charming Kitten has been targeting journalists, political and human rights activists in a new campaign. Researchers from…
Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user…
A set of vulnerabilities in the Cisco Discovery Protocol (CDP) exposes tens of millions of devices to the risk of…
Check Point experts discovered a high-severity flaw in Philips Hue Smart Light Bulbs that can be exploited to gain entry into a…
File hosting service company Dropbox paid out $1 million for vulnerabilities reported by researchers through its bug bounty program. Since…
Threat actors are abusing the Bitbucket code hosting service to host seven types of malware that has already claimed more…
This website uses cookies.