Will Blockchain Actually Change the World?
Blockchain emerged onto the tech scene in the early 21st century as a means of storing and trading cryptocurrency, but it quickly became obvious that the digital ledger technology couldRead More →
Blockchain emerged onto the tech scene in the early 21st century as a means of storing and trading cryptocurrency, but it quickly became obvious that the digital ledger technology couldRead More →
In its latest security alert, Microsoft asked its customers to apply available updates to fix two privilege escalation vulnerabilities in Active Directory whose exploitation would allow threat actors to easilyRead More →
In recent days it was revealed the detection of a new attack vector for the successful exploitation of remote code execution (RCE) vulnerabilities in Log4j, the Java logging library presentRead More →
In its latest alert, the Cybersecurity and Infrastructure Security Agency (CISA) invites VMware administrators to update their deployments to address a critical vulnerability in Workspace ONE UEM. According to theRead More →
Last Friday, the highly anticipated film Spider-Man: No Way Home was released, and fans are desperate to find tickets, sold out since the pre-sale in various countries. This phenomenon hasRead More →
In a controversial move but in keeping with its form of government, Chinese telecommunications authority issued a list of 100 topics that local Internet users will not be allowed toRead More →
A report by the security firm Kaspersky details the detection of a hacking group using an Internet Information Services (IIS) web server module identified as Owowa, with which they seekRead More →
Prevailion security specialists report that a newly identified spear phishing campaign is distributing a new remote access Trojan (RAT) capable of manipulating Windows Registry in order to evade the mostRead More →
On December 10, the detection of a critical vulnerability in the Log4j utility, developed by the Apache Software Foundation and whose exploitation has generated problems for thousands of online implementations,Read More →
After three years of inactivity, a Russian hacking group reappeared to steal a large amount of money from multiple banks by compromising an automated workstation operated by a Bank ofRead More →