Hacker sends strange message to all customers of a shoe company
A threat actor has played a bad trick on the IT team and many of the customers of a popular shoe company. According to ethical hacking specialists, a hacker, self-appointedRead More →
A threat actor has played a bad trick on the IT team and many of the customers of a popular shoe company. According to ethical hacking specialists, a hacker, self-appointedRead More →
For decades, world powers have contested supremacy in many respects, a clear example is technologies. Cybersecurity specialists mention that China has been surpassing US achievements in the field of artificialRead More →
Data protection specialists report that an unidentified threat actor is auctioning off a database with records of more than 90 million Brazilian citizens on dark web forums. The bidder statesRead More →
Officials at Sberbank Rossi, the largest Russian bank, have revealed some details about their investigation of a data breach that would have affected at least 200 users of the bank.Read More →
Users of Yuri Gagarin International Airport, in the Russian city of Saratov, were surprised by an uncommon screening. Data protection experts reported that a hacker group would have infiltrated theRead More →
A team of web application security experts has discovered multiple security vulnerabilities in Foxit PDF Reader, one of the most popular PDF reader tools and the main competitor of AdobeRead More →
Social protests and government attempts to disrupt them can have unexpected consequences in different areas, including on new technologies. Information security experts report that ATMs in Hong Kong are runningRead More →
Digital forensics specialists have revealed the existence of zero-day vulnerability in the Android operating system that, if exploited, could grant threat actors full control of at least 18 smartphone modelsRead More →
Information security specialists have revealed details about a recent cybercriminal campaign identified as “MasterMana Botnet”, related to multiple key concepts in the world of cybersecurity, such as the use ofRead More →
Any deployment, no matter its protections, may be exposed to further hacking attacks. Ethical hacking experts have found a way to extract information contained in Portable Document Format (PDF) filesRead More →