Silent AirTags with no speakers are being used for stalking
A couple of years ago Apple launched the AirTag, a gadget that users could link to their mobile devices in order to prevent theft or loss; when someone can’t findRead More →
A couple of years ago Apple launched the AirTag, a gadget that users could link to their mobile devices in order to prevent theft or loss; when someone can’t findRead More →
In a recent report, the Federal Bureau of Investigation (FBI) Director Christopher Wray attributes responsibility for the largest cyberattack campaigns to the Chinese Communist Party, considering that for the currentRead More →
Timur Yunosov is a Russian cybersecurity researcher specializing in mobile security and payment system analysis. Working for Positive Technologies, Yunosov demonstrated how to exploit known vulnerabilities in Apple Pay toRead More →
In recent weeks, several cyber security researchers have reported massive flaws in the Internet infrastructure in North Korea, affecting the few users who have free access to the online worldRead More →
Cybersecurity specialists report the detection of four vulnerabilities in FortiWeb, the web application firewall (WAF) solution developed by the technology firm Fortinet. According to the report, the successful exploitation ofRead More →
Through its Internet Crime Center (IC3), the Federal Bureau of Investigation (FBI) reports that cybercriminal groups are exploiting some errors in the verification mechanisms in a professional and job platformRead More →
Samba announced the release of some updates that aim to address various vulnerabilities whose successful exploitation would allow threat actors to lead to an arbitrary code execution scenario with highRead More →
In one unusual incident, screens in the Israeli Postal Company’s collection and distribution areas were synchronized to play a video showing only the phrase “DOWN WITH ISRAEL”, in what appearsRead More →
In recent days, cryptocurrency platform Qubit Finance confirmed that its systems were compromised by a group of unidentified threat actors. The platform, specializing in decentralized lending, has even appealed toRead More →
Cybersecurity specialists recently published an exploit for a local privilege escalation vulnerability whose successful exploitation would allow malicious users to obtain administrator privileges on Windows 10 systems. Tracked as CVE-2022-21882,Read More →