Critical vulnerabilities in NVIDIA; update as soon as possible
NVIDIA security teams announced the release of a set of updates for their GPU display drivers and vGPU software, correcting a total of 16 security flaws. Six of the reportedRead More →
NVIDIA security teams announced the release of a set of updates for their GPU display drivers and vGPU software, correcting a total of 16 security flaws. Six of the reportedRead More →
The U.S. Department of Justice (DOJ) announced that Andrei Tyurin, a 37-year-old Russian citizen, has been sentenced to 12 years in prison for his participation in an international hacking campaignRead More →
A group of specialists revealed the finding of a security flaw whose exploitation would have resulted in illegitimate access to more than 100,000 records of United Nations Environment Program (UNEP)Read More →
In-flight aircraft monitoring is a very entertaining way to learn how to use tracking tools, information security experts from the International Institute of Cyber Security (IICS) mention. For doing so,Read More →
Cybersecurity specialists reported the finding of a severe vulnerability in the chips installed in the Google Titan and YubiKey security keys. Reported vulnerabilities would allow malicious hackers to obtain theRead More →
China maintains a strict policy against illegal online gambling platforms, although its latest move seems to take things to a new level. The authorities have decided to work with theRead More →
Ho.Mobile, the low-cost operator for telecomm giant Vodafone, has announced that a hacking group managed to compromise part of its customer database, which stored personal information, SIM details, among otherRead More →
The U.S. government has announced the launching of Hack the Army 3.0, the latest version of its vulnerability bounty program operated by the HackerOne platform. The Armed Forces are lookingRead More →
A report published by cybersecurity researcher Ahmed Hassan mentions that the “People Nearby” feature, which allows Telegram users to see who is in nearby locations, could be abused by threatRead More →
Juspay, an India-based company which offers payment processing services for companies like Amazon and Swiggy, has acknowledged a massive data breach affecting up to 30.5 million users, whose masked cardRead More →
A recent report mentions that the Web Application Firewall (WAF) developed by Cloudflare is vulnerable to rule bypass attacks. WAF-protected websites block attacks based on denial of service (DoS) orRead More →
A group of malicious hackers has leaked data from around 10,000 American Express cardholders in Mexico on a dark web hacking forum; the information is available to any interested partyRead More →
According to a recent report, malicious hacking groups may abuse a deserialization vulnerability in Zend Framework to run remote code on PHP sites. Identified as CVE-2021-3007, this flaw could alsoRead More →
Cybersecurity specialists report that over 100 million cardholders’ registers were leaked in what seems to be the biggest data breach ever detected in India. The leak seems related to aRead More →
Although this topic is rarely considered important, videogame related security can create unprecedented problems for companies, employees, and users. This is the premise from which security firm Kela, based inRead More →
A couple of years ago a group of information security specialists from the University of Maryland published research to show how online voice to text conversion services could be exploitedRead More →
The information stored on a computer does not always end up on permanent storage drives (hard drives, solid-state drives, removable storage, among others), but is also stored in RAM, asRead More →
When searching for torrents on the Internet it is necessary to use specialized search engines but how to know which is the best? How many options are available? This time,Read More →
Cybersecurity experts have just discovered a new variant of Golang based malware capable of being automatically distributed via Windows and Linux servers. This is a multi platform malware with wormRead More →
Not many people know it, but it’s very easy to get in the way of a phone without the owner having any idea what’s going on. This time, mobile securityRead More →