Devices from Dell, HP, and Lenovo used outdated OpenSSL versions
Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered...
Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered...
Google on Thursday released security updates to address a new zero-day vulnerability, tracked as CVE-2022-4135, impacting the Chrome web browser....
Cybernews investigated a data sample available for sale containing up-to-date mobile phone numbers of nearly 500 million WhatsApp users. Original...
An international law enforcement operation has dismantled an online phone number spoofing service called iSpoof. An international law enforcement operation that...
The British government banned the installation of Chinese-linked security cameras at sensitive facilities due to security risks. Reuters reports that...
RansomExx ransomware is the last ransomware in order of time to have a version totally written in the Rust programming...
Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts...
Microsoft reported that hackers have exploited flaws in a now-discontinued web server called Boa in attacks against critical industries. Microsoft experts...
The shopping event of the year, Black Friday, is almost here, and while the big day does not officially arrive...
Decentralization can make enterprises more agile but it also makes IT and network security more complex. Creating a strong security...
This blog entry looks at the characteristics of a new WannaRen ransomware variant, which we named Life ransomware after its...
Pro-Russian hacker collective Killnet took down the European Parliament website with a DDoS cyberattack. The Pro-Russia group of hacktivists Killnet...
The operators behind the Ducktail information stealer continue to improve their malicious code, operators experts warn. In late July 2022,...
Researchers discovered that analytics data associated with iPhone include Directory Services Identifier (DSID) that could allow identifying users. Researchers at...
Microsoft released an out-of-band update to fix problems tied to a recent Windows security patch that caused Kerberos authentication issues....
The gang behind Quantum Locker used a particular modus operandi to target large enterprises relying on cloud services in the...
Cybersecurity incidents were plentiful in 2022, causing many problems for industrial infrastructure owners and operators. However, luckily, we did not...
This is the first edition of our policy analysis and observations of trends in the regulation of cyberspace, and cybersecurity,...
A look back on the year 2022 and what to expect in 2023 Every year, as part of the Kaspersky...
Let’s give a look at API vulnerabilities by reading the API Security Top 10 published by the Open Web Application...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using...
Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer...
Two Estonian citizens were arrested in Tallinn for allegedly running a $575 million cryptocurrency fraud scheme. Two Estonian nationals were...