Steps to create your own VPN
Alphabet Inc., through its cybersecurity subsidiary Jigsaw, announced the launch of Outline, a project that allows any user to create and run their own virtual private network (VPN) server toRead More →
Alphabet Inc., through its cybersecurity subsidiary Jigsaw, announced the launch of Outline, a project that allows any user to create and run their own virtual private network (VPN) server toRead More →
Last Thursday the Goods and Service Tax Network (GSTN) posted a tweet mentioning that its security team detected “some activity in the cyberspace by unscrupulous elements”. According to the post,Read More →
During the last weeks the cybersecurity community has identified a new data breach outbreak related to the leaker known as ShinyHunters, who has been attacking multiple organizations worldwide. This time,Read More →
While it is obvious to mention that the threat actors behind the attack on SolarWinds have advanced knowledge, the cybersecurity community had not been able to specifically define its methodsRead More →
After a few convulsed weeks resulting from a highly controversial electoral process, Joe Biden has finally begun to serve as president of the United States and, although there are noRead More →
Relevant cybercriminal groups have been performing massive online scans to detect servers affected by a critical SAP vulnerability for which a fully functional exploit already exists. The flaw was trackedRead More →
Cybersecurity experts reported the detection of a sophisticated malvertising campaign. Dubbed “LuckyBoy”, the operators rely on strong obfuscation and cloaking to avoid detection by security solutions in iOS, Android andRead More →
The personal data of airline users around the world has become one of the main objectives of hacking groups. The most recent campaign related to these attacks has been attributedRead More →
Over 1.4 million personal records of Pixlr users were exposed by a hacker through a forum on dark web; as you may remember, Pixlr a free online image editing appRead More →
A recent cybersecurity report is referring to the detection of a sensitive data stealing campaign affecting United Kingdom citizens. The local media mentioned that operators of this phishing scheme areRead More →
The executives of cybersecurity firm Malwarebytes have revealed that their systems were hacked by the same group of threat actors responsible for the recent incident at SolarWinds. Malwarebytes does notRead More →
A British security specialist reported finding a critical vulnerability in Shazam, the popular music recognition app, which would allow threat actors to extract a user’s location data by sending aRead More →
According to a recent report by cybersecurity experts, the operators of a botnet have been targeting non-patched applications running on Linux systems. The botnet, identified as FreakOut, was first identifiedRead More →
Cybersecurity specialists published a report regarding the finding of at least 7 vulnerabilities detected in a popular DNS software package deployed on routers and access points in all kinds ofRead More →
After acknowledging a serious security incident, the Russian cryptocurrency exchange platform Livecoin announced that it will shut down its services permanently, inviting its clients to withdraw all their funds. ARead More →
Nowadays it is very easy to find unknown locations using GPS technology, Internet connection and a smartphone; unfortunately this has its disadvantages, mainly those related to user privacy. That’s whyRead More →
A Siemens security report revealed that some of its Digital Industries Software solutions for product development have more than 20 vulnerabilities that could be exploited for arbitrary code execution byRead More →
After the upheaval generated by the update in the privacy and data sharing policy on WhatsApp, Facebook faces a new controversy due to a data breach that would have compromisedRead More →
Joker’s Stash operators have announced that the platform will be permanently shutdown in the middle of next month. This is one of the most popular and oldest illegal online marketsRead More →
Positive Technologies researcher Nikita Ambramov reported the finding of a critical vulnerability in F5 Networks BIG-IP products that could be exploited to launch denial of service (DoS) attacks remotely. AmbramovRead More →