Et Tu…The Great Suspender? From Apple to Google, Malware is Upping its Game
Safe browsing apps can be great tools for proactive web defense Some of us are old enough to remember a time when one could say with a decent degree ofRead More →
Safe browsing apps can be great tools for proactive web defense Some of us are old enough to remember a time when one could say with a decent degree ofRead More →
MyHeritage website operators announced the launching of a new deepfake-driven technology tool that can be used to edit faces in old photographs and in somehow bring the dead back toRead More →
The attack on the SolarWinds supply chain through the SolarWinds Orion tool has proven to be one of the most devastating hacking incidents of recent years, impacting thousands of publicRead More →
WizCase security researchers reported the finding of a private information leaking incident belonging to thousands of Turkish citizens due to a misconfiguration in an Amazon Web Services (AWS) bucket. ThisRead More →
Google Project Zero researchers revealed the finding of a critical vulnerability present in Windows systems that could be exploited to deploy remote code execution attacks. Tracked as CVE-2021-24093, the vulnerabilityRead More →
Due to an error in the implementation of its online system, the Department of Health and Welfare of West Bengal, India presented the information of at least 8 million COVID-19Read More →
Have you ever thought about how a video you haven’t seen but are interested in suddenly appears on your YouTube recommendations? Or how Google seems to know what you’re searchingRead More →
Cybersecurity specialists reported the finding of some incorrect middleware configurations in Nginx that could expose compromised web applications to severe cyberattacks. Nginx is a modular, lightweight and open source webRead More →
Commercial aircraft manufacturer Bombardier has just revealed that it was the victim of a data breach as a result of the operators of the Clop ransomware, which exploited a criticalRead More →
According to a report published by The Washington Post, the National Aeronautics and Space Administration (NASA) and the US Federal Aviation Administration (FAA) were also compromised during the recent attackRead More →
Cybersecurity specialists reported the finding of a critical vulnerability in VMware vCenter Server. Tracked as CVE-2021-21972, this is a Remote Code Execution (RCE) flaw that could be exploited by threatRead More →
After an arduous investigation into the operators of some profiles, Twitter decided to delete dozens of accounts allegedly linked to the Russian government dedicated to the dissemination of misinformation aboutRead More →
The executives of CityBee, a car-sharing company operating in Lithuania, acknowledged a security incident that resulted in customers’ data breach, including their login credentials; the compromised information is available onRead More →
The development team behind systeminformation announced the patching of a severe security flaw that exposed vulnerable applications to arbitrary command injection attacks in the popular Node.js package. As you mayRead More →
Developers of the mobile app SHAREit published a report mentioning that the severe security flaws detected a few days ago in the app code have finally been corrected. SHAREit, developedRead More →
Information security experts reported the detection of a threat actor selling information from up to 12,000 HSBC accounts in Mexico and the United States. The report, prepared by the researcherRead More →
A hacking group sponsored by the Chinese government would have managed to copy and use a zero-day exploit for Windows systems originally developed by Equation Group, a specialized hacking teamRead More →
Cybersecurity specialists reported the detection of a new malware campaign specially designed to infect Mac devices, accumulating nearly 30,000 successful infections by the time now. This new variant, dubbed “SilverRead More →
An article on The Telegraph dubs cybercrime as “the fastest growing crime in the world,” even labeling it as “an industry” given the impact it has on economies and theRead More →
Intro Cybersecurity has dramatically changed in the past decade. The focus has been steadily shifting from protection to detection. In this process, threat hunting (TH) has played an instrumental role.Read More →