Experts from Group-Ib that exposed the most recent campaigns carried out by Silence reported that damage from the APT group…
Maintainers of the RubyGems package repository have removed 18 malicious versions of 11 Ruby libraries that contained a backdoor. Maintainers…
Your IP address represents your digital identity online, hacking it not only allows attackers to access your device or your…
Webmin, the popular open-source web-based interface for Unix admin contained a remote code execution vulnerability for more than a year.…
Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers. A public Jailbreak…
A study conducted by researchers at Cyjax revealed that organizations expose sensitive data via sandboxes used for malware analysis. Experts…
Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering…
Samsung announced that the Galaxy S10, the Galaxy S9, and Galaxy Note 9 have obtained the Security Technical Implementation Guide (STIG) approval Other…
At least 23 local governments were impacted by a wave of ransomware attacks that according to the experts are the…
A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Hi folk, let…
This website uses cookies.