
Attackers are already using Log4Shell to install malware and miners
Cybercriminals have already taken advantage of the dangerous Log4j Log4Shell flaw, through which they try to deploy malware to vulnerable Read more
Cybercriminals have already taken advantage of the dangerous Log4j Log4Shell flaw, through which they try to deploy malware to vulnerable Read more
Volvo Cars, a Swedish passenger car manufacturer, has reported a breach in its network. According to the company’s official statement, Read more
Cybersecurity experts have become aware of the active exploitation of a vulnerability affecting millions of routers. As noted by experts, Read more
Cybersecurity researchers have discovered previously unknown methods of launching cyberattacks with URL redirects on weak OAuth 2.0 implementations. Such attacks Read more
Officials from the Federal Bureau of Investigation (FBI) say Cuba ransomware operators earned at least $ 43.9 million this year. In an Read more
Apple has notified several US State Department officials that their devices are infected with spyware developed by Israel’s NSO Group, Reuters and The Read more
The cybersecurity researcher, known under the pseudonym Nusenu, said that he had identified the hacking group KAX17, which controlled thousands of malicious Read more
Researchers at IoT Inspector, in collaboration with Chip, have verified the security of many popular routers from Asus, AVM, D-Link, Netgear, Edimax, Read more
The Zoho developers urged their customers to urgently update their Desktop Central and Desktop Central MSP installations to the latest version available. The Read more
Spam mailings became known on Tuesday, writes Vice. An employee of one of the companies said that the printer in his office printed a text Read more