Two famous gamers used DDOS attacks on Xbox servers to cheat
The world of videogames has become a highly competitive environment, leading many gamers to take drastic steps to stand out from the rest. A recent report mentions that two ApexRead More →
The world of videogames has become a highly competitive environment, leading many gamers to take drastic steps to stand out from the rest. A recent report mentions that two ApexRead More →
The US Department of Justice (DOJ) revealed that over the most recent months, a total of 474 individuals have been legally prosecuted for their participation in various fraudulent COVID-19 relatedRead More →
In a recent supply chain attack, threat actors managed to compromise the official Github repository of PHP, manipulating the code base to send malicious acknowledgments to the php-sc Git repository,Read More →
Cybersecurity specialists reported the finding of two severe vulnerabilities in Linux-based operating systems that could allow threat actors to bypass the mitigations implemented to prevent Spectre and Meltdown attacks, leadingRead More →
Apple developers announced the release of a set of updates to fix a zero-day iOS flaw that impacts both iPhone and iPad devices and Apple Watch. According to the report,Read More →
A recent investigation details the detection of a new method of infection for Android devices based on the use of malware that threat actors disguise as a critical update onRead More →
Authorities in Essex, England, announced the arrest of six individuals accused of having used malware to hack multiple ATMs, stealing more than 120,000 pounds. Petru-Giani Feraru, Razvan Danaila, Robert Danaila,Read More →
A former employee of SpaceX, the aerospace company property of the renowned millionaire Elon Musk, acknowledged that he was involved in the operation of a security fraud that led toRead More →
A group of specialists has detailed a method for abusing a well-known “H2C smuggling” technique in order to authenticate and bypass some WAF mechanisms on multiple cloud platforms. Early stagesRead More →
A group of specialists revealed the finding of a security flaw in the architecture of 5G networks and virtualized network functions. Successful exploitation of this vulnerability would allow threat actorsRead More →