Zoom zero-day discovery makes calls safer, hackers $200,000 richer
Two Dutch white-hat security specialists entered the annual computer hacking contest Pwn2Own, managed to find a Remote Code Execution (RCE)...
Two Dutch white-hat security specialists entered the annual computer hacking contest Pwn2Own, managed to find a Remote Code Execution (RCE)...
Ransomware operators shut down two production facilities having a place with a European manufacturer in the wake of conveying a...
The classic scheme to defraud Russian bank clients with the help of malicious emails is experiencing a second birth. Now...
Two IT universities of Ireland the National College of Ireland (NCI) and the Technological University of Dublin have been hit...
Gigaset, a German device maker, was recently hit with a supply chain attack, the hackers breached a minimum of one...
Security researchers have noted an increase in the misuse of legitimate services such as Google Forms and Telegram for gathering...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked...
Pwn2Own 2021 – Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One...
Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million...
Cisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple...
The maintainers of the PHP programming language confirmed that threat actors may have compromised a user database containing their passwords....
A joint operation of Europol and the Italian Postal and Communication Police resulted in the arrest of an Italian national...
A timely warning to keep systems patched has appeared, via a jointly-released report from Onapsis and SAP. The report details...
Researchers have discovered malware camouflaged as a Netflix application, prowling on the Google Play store, spread through WhatsApp messages. As...
Sierra Wireless, a Canadian IoT solutions provider said that it has reopened its manufacturing site's production after the company suffered...
Just days after a Facebook data leak was revealed, security experts have discovered another one, this time the victim being...
In January, Andrei Tyurin was sentenced to 12 years in prison for the largest theft of personal data of bank...
A banking Trojan has been found out by cybersecurity researchers, which has targeted many organizations across the state of Brazil....
Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...