Pwn2Own Toronto 2022 hacking competition. Samsung S22 hacked
The Pwn2Own Toronto 2022 hacking competition has begun, this is the 10th anniversary of the consumer-focused version of the contest....
The Pwn2Own Toronto 2022 hacking competition has begun, this is the 10th anniversary of the consumer-focused version of the contest....
Sophos addressed several vulnerabilities affecting its Sophos Firewall version 19.5, including arbitrary code execution issues. Sophos has released security patches...
There are two main types of online fraud aimed at stealing user data and money: phishing and scams. Phishers primarily...
CISOs and security professionals need a cybersecurity plan to succeed. Explore three keys for a winning strategy. If you like...
Learn about chaos engineering, a method of resilience testing that intentionally introduces “chaos” into a system to discover vulnerabilities and...
Russia’s second-largest bank VTB Bank reveals it is facing the largest DDoS (distributed denial of service) attack in its history....
Researchers discovered a security flaw in the connected vehicle service SiriusXM that exposes multiple car models to remote attacks. Cybersecurity...
Researchers spotted a version of the open-source ransomware toolkit Cryptonite that doesn’t support decryption capabilities. Fortinet researchers discovered a sample of...
Nicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more than $20 million in a...
Introduction If one sheep leaps over the ditch, the rest will follow. This is an old saying, found in various...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend....
Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. “In the Box” dark...
A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers...
The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity...
Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment...
US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies....
Experts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. Researchers...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Google released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in the wild. Google...
It would hardly be an exaggeration to say that the phrase “indicators of compromise” (or IOCs) can be found in...
Qualys researchers demonstrated how to chain a new Linux flaw with two other two issues to gain full root privileges...
Threat actors could exploit drones for payload delivery, kinetic operations, and even diversion, experts warn. Original post at https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once...
Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of...