Skip to content
  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
24 Mar, 2023
Latest News:
F.B.I. Investigates Cyberattack That Targeted N.Y.C. Law Department
Hackers Attack Airlines with New RAT Downloader
Berlin security service blames Iran for cyberattack on German companies

  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
  • Home
  • Blog
  • Latest
  • Page 2

Category: Latest

unofficial patch appeared another 0-day problem Windows

An unofficial patch has appeared for another 0-day problem in Windows

30/11/202130/11/2021

There are free unofficial fixes for a local privilege escalation vulnerability found in the Mobile Device Management Service, specifically in Read more

Latest, News
New Linux malware, CronRAT hiding cron job incorrect dates

New Linux malware, CronRAT, is hiding in a cron job with incorrect dates

30/11/202130/11/2021

Researchers at the Dutch company Sansec have discovered a new Remote Access Trojan (RAT) for Linux that escapes detection by hiding in Read more

Latest, News
Cybercriminals hacked Panasonic stayed online 4 months

Cybercriminals hacked Panasonic and stayed online for 4 months

30/11/202130/11/2021

Japanese tech giant Panasonic has admitted to hacking its own systems and leaking internal data. According to the official report, Read more

Latest, News
Zoom found two vulnerabilities scoring 7.3 CVSS scale

Zoom found two vulnerabilities scoring 7.3 on the CVSS scale

30/11/2021

Researchers at Google Project Zero have reported further security issues with Zoom, the popular video conferencing software. Experts noted that Read more

Latest, News
Ukrainian law enforcement officers have arrested members of the hack group Phoenix

Ukrainian law enforcement officers have arrested members of the hacking group Phoenix

26/11/202126/11/2021

The Security Service of Ukraine (SBU) announced the arrest of five members of the Phoenix international hacking group, which specializes in remote Read more

Latest, News
Conti ransomware operators fall victim data breach

Conti ransomware operators fall victim to data breach

22/11/202126/11/2021

Operators of the Conti ransomware suffered from a data leak: the Swiss cybersecurity company Prodaft was able to determine the real IP Read more

Latest, News
Researchers have suggested using smartphones find hidden cameras

Researchers have suggested using smartphones to find hidden cameras

22/11/202126/11/2021

A team of researchers from the National University of Singapore and Yonsei University have described an interesting concept : the use of Read more

Latest, News
Researchers have noticed darknet discussing exploits service

Researchers have noticed that the darknet is discussing exploits as a service

19/11/202126/11/2021

Analysts at Digital Shadows have prepared a report on the exploit market on the darknet. It is noted that the criminals came up Read more

Latest, News
Canadian teen arrested stealing $ 36.5 million cryptocurrency

Canadian teen arrested for stealing $ 36.5 million in cryptocurrency

17/11/202126/11/2021

The FBI, the US Secret Service’s e-crime group, and police in Hamilton, Ontario, Canada, arrested a teenager who stole about US $ Read more

Latest, News
Pakistani hackers set up fake app store for their attacks

Pakistani hackers set up fake app store for their attacks

16/11/202126/11/2021

Facebook said it interfered with one Pakistani and three Syrian hacker groups. A Pakistani hack group used Facebook accounts to attack members of Read more

Latest, News

Posts navigation

Previous 1 2 3 … 12 Next
  • Popular
  • Recent
  • Comments
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • The court will consider Epic Games’ antitrust lawsuit against Apple

    The court will consider Epic Games’ antitrust lawsuit against Apple

    04/05/2021
  • Hackers attack cryptocurrency users through Tor servers

    Hackers attack cryptocurrency users through Tor servers

    10/05/2021
  • Germany bans FaceBook from collecting data from WhatsApp users

    Germany bans FaceBook from collecting data from WhatsApp users

    11/05/2021
  • Apple reports on the fight against fraud in 2020

    Apple reports on the fight against fraud in 2020

    11/05/2021
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • Snatch hacked Volvo Cars and stole company documents

    Snatch hacked Volvo Cars and stole company documents

    12/12/2021
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    11/12/2021
  • Phishers exploit OAuth holes in Microsoft and Google implementations

    Phishers exploit OAuth holes in Microsoft and Google implementations

    10/12/2021
  • The authors of the ransomware Cuba “earned” $ 44 million

    The authors of the ransomware Cuba “earned” $ 44 million

    07/12/2021

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations
  • The authors of the ransomware Cuba “earned” $ 44 million

Popular Posts

Attackers already using Log4Shell install malware miners

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021
Snatch hacked Volvo Cars and stole company documents

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

11 Dec 2021
Phishers exploit OAuth holes Microsoft Google implementations

Phishers exploit OAuth holes in Microsoft and Google implementations

10 Dec 2021

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Facebook

Facebook

Popular Posts

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Copyright © 2023 . All rights reserved.
 

Loading Comments...