AIVD says they face cyber attacks from Russia and China every day
According to the head of the country's General Intelligence and Security Service, these hackers break into the computers of companies...
According to the head of the country's General Intelligence and Security Service, these hackers break into the computers of companies...
Google Project Zero team disclosed the details of a recently fixed Windows flaw, tracked as CVE-2021-24093, that can be compromised...
Accidentally, a law firm has disclosed client data of 15,000 incidents in which individuals have been killed and wounded after...
A year into the pandemic, Turkey Dog-related activity is ongoing with campaigns that keep on utilizing the "free internet" lures....
The state of stalkerware in 2020 (PDF) Main findings Kaspersky’s data shows that the scale of the stalkerware issue has...
In warfare, CornerShot is a weapon that allows a soldier to look past a corner (and possibly take a shot),...
An open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol. DisclaimerOpenWifiPass is experimental software and is...
Data Breach: WizCase team uncovered a massive data leak containing private information about Turkish Citizens through a misconfigured Amazon S3 bucket....
Hackers have broken into the biochemical systems of an Oxford University lab where researchers are working on the study of...
Dutch Research Council (NWO) confirmed that the recent cyberattack that forced it to take its servers offline was caused by...
The Chinese hacking group, tracked as TA413, used a malicious Firefox add-on in a cyberespionage campaign aimed at Tibetans. China-linked...
Cisco addressed over a dozen vulnerabilities in its products, including three critical bugs in ACI Multi-Site Orchestrator, Application Services Engine,...
North Korea-linked Lazarus APT group has targeted the defense industry with the custom-backdoor dubbed ThreatNeedle since 2020. North Korea-linked Lazarus...
Summary: Arithmetic overflow can happen while processing NOA IE due to improper error handling in Snapdragon Auto, Snapdragon Compute, Snapdragon...
Summary: Possible out of bound access in TA while processing a command from NS side due to improper length check...
Summary: Allowing RTT frames to be linked with non randomized MAC address by comparing the sequence numbers can lead to...
Summary: User can overwrite Security Code NV item without knowing current SPC due to improper validation of SPC code setting...
Summary: All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Command Injection via template. Reference Links(if...
US tax season is upon us, a time of the year when a special kind of vermin comes crawling out...
Approximately 100 US companies and nine government agencies were affected by the hack using Orion software of SolarWinds, which is...
French authorities unearthed a glut of stolen credentials on the dark web, apparently belonging to the healthcare workers. The authorities...
Mozilla's latest Firefox 86 has been rolled -out for desktop, Mac, Windows, and Linux platforms. The browser upgrade brings features...
Lazarus targets defense industry with ThreatNeedle (PDF) We named Lazarus the most active group of 2020. We’ve observed numerous activities...
If you want to learn more about the techniques utlized in this framework please take a look at Part 1...