How To Protect Yourself Online: 10 Critical Steps
When you go online today, your personal information is at risk. It’s not just identity theft – it can be anything from a hacker stealing your bank account number toRead More →
When you go online today, your personal information is at risk. It’s not just identity theft – it can be anything from a hacker stealing your bank account number toRead More →
Security researcher Wolfie Christl has detailed how a seemingly harmless custom keyboard mobile app with millions of downloads has almost complete access to the devices where it is installed, inRead More →
Cybersecurity specialists from tech firm Cybereason reported the uncovering of a Chinese cybercriminal operation which main goal was intellectual property theft. Identified as “Operation Cuckoobees”, this campaign was attributed toRead More →
In its latest security advisory Cisco announced the fix of several flaws in its NFV Infrastructure Software (NFVIS), a network virtualization solution for virtual network function (VNF) management. Two ofRead More →
A report by F5 Networks points to the detection of a critical vulnerability that would allow threat actors with access to an exposed network to execute arbitrary commands, deploy fileRead More →
The Open Web Application Security Project (OWASP) announced the fixing of a critical vulnerability in its Enterprise Security API (ESAPI) whose exploitation could have allowed threat actors to run pathRead More →
Kellogg Community College at Michigan, U.S., decided to shut down its campuses and cancel every single activity after being the target of a massive cyberattack. The Battle Creek- based collegeRead More →
A Ukrainian businessman claims that a group of Russian military personnel in the city of Melitopol, Ukraine, stole all the equipment from an agricultural machinery dealership in order to sendRead More →
A researcher has detected a critical vulnerability in some of the most common malware and ransomware variants today and whose exploitation would allow interrupting file encryption on infected systems, preventingRead More →
A report by Trend Micro details the detection of various samples of the AvosLocker ransomware capable of using legitimate files to disable antivirus solutions and evade detection of any securityRead More →