How to create your professional deep fake video easily and free of cost
While it would be difficult for the vast majority of people to develop a concrete definition of the concept of “deepfake”, it is a fact that many of us haveRead More →
While it would be difficult for the vast majority of people to develop a concrete definition of the concept of “deepfake”, it is a fact that many of us haveRead More →
As many iPhone users may have noticed, the iOS 14.5 update includes an unlock feature using the Apple Watch. The feature was included in order to unlock the smartphone withRead More →
Cybersecurity specialists reported the finding of a critical information disclosure vulnerability in the Linux kernel, the successful exploitation of which would allow sensitive information to be extracted from the compromisedRead More →
Eaton developers have announced the release of some security patches for their Intelligent Power Manager (IPM) software, hoping to fix some security flaws considered critical, including a couple of bugsRead More →
A group of ransomware hackers has released a statement threatening to expose confidential files from the Metropolitan Police Department of the District of Columbia, Washington D.C., unless law enforcement authoritiesRead More →
A security report mentions that the Radixx Res reservation system, a subsidiary of Sabre Corporation, has been compromised by a cyberattack using a dangerous malware variant. While the report notesRead More →
Information security experts report that a well known hacker leaked about 20 million user records from BigBasket, a popular edible delivery service based in India. The database, published on aRead More →
Just a few days ago a hacker identified as Pompompurin announced the leak of a database with more than 250 million confidential records belonging to U.S. citizens. This database wasRead More →
A recently released security report ensures that thousands of ABUS Secvest smart alarms could be exposed to exploiting a flaw that would allow threat actors to disable security systems remotely,Read More →
This Sunday night, the new edition of the Academy Awards ceremony took place, which many threat actors tried to take advantage of to steal sensitive information from unsuspecting users inRead More →