Security Experts Unearthed the Flaws in EPUB Similar to Web Browsers
Security researchers at imec-DistriNet Research Group have discovered the vulnerabilities in e-book reading systems that allow hackers to exploit the...
Security researchers at imec-DistriNet Research Group have discovered the vulnerabilities in e-book reading systems that allow hackers to exploit the...
Nobelium, a Russian hacking group that was responsible for the 2020 SolarWinds cyberattacks, is back in the game, however, now,...
CyberNews researchers found that front-runners are abusing decentralized cryptocurrency exchanges by draining hundreds of millions in crypto from trader transactions...
Group-IB discovered a database allegedly belonging to a bulletproof hosting provider DDoS-Guard posted for sale on a cybercrime forum. Group-IB,...
Zero-day exploit broker Zerodium is looking for 0day exploits affecting the IM client tool Pidgin on Windows and Linux. Zero-day...
The US DoJ seized two domains used by APT29 group in recent attacks impersonating the U.S. USAID to spread malware....
White House spokeswoman speculates threat actors behind the JBS ransomware attack have a Russian origin. The American food processing giant...
Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a...
WhatsApp, the end-to-end encrypted messaging service that has lost users, its founders, and a large amount of public goodwill, issued...
If you were to compose a list of tools and software developed by security and privacy defenders that ended up...
This blog post was authored by Hossein Jazi. The Kimsuky APT—also known as Thallium, Black Banshee, and Velvet Chollima—is a...
A Russian person was found guilty in the United States of using a bot farm and hiring servers to create...
Software code repositories might be hiding credentials, sensitive data, and other secrets of an organization without the knowledge of developers....
More than 500 suspects were arrested in the Interpol-coordinated Operation ‘HAECHI-I’ and $83 million were seized which belonged to the...
Users receive warnings from public and private organizations asking them to be aware of fraud links and sources, to not...
Scammers send out fake 'unsubscribe' spam emails to validate legitimate email addresses for future phishing and spam campaigns. Spammers have been...
For over a year we’ve been living in a world gripped by the COVID-19 pandemic. Not only has the pandemic...
The American food processing company and meat producer JBS Foods was forced to shut down production at multiple sites worldwide following...
The popular Russian hacker Pavel Sitnikov was arrested by Russian authorities on charges of distributing malware via his Telegram channel....
“Prometheus” and “Grief” – a multi-billion dollar ransomware market obtained two new emerging players. In today’s world, information and data...
The Swedish Public Health Agency has shut down the country’s infectious diseases database, SmiNet, last week after multiple hacking attempts....
Denmark’s foreign secret service allowed the US NSA to spy on European politicians through a Danish telecommunications hub. Journalists from Danish...
This blog post was authored by hasherezade NSIS (Nullsoft Scriptable Install System) is a framework dedicated to creating software installers....
Cybercriminals who targeted hospitals in New Zealand’s Waikato district have published the stolen patient data to the local media outlets,...