PoC Code Publishing Gives Attackers 47 Days Head Start
Early disclosure of PoC code can help the cybersecurity community and push…
Hacker put HIV / AIDS patient data on sale
In addition, he states that he can obtain databases of HIV and…
35 years ago, in 1985, the legendary Windows 1.0 appeared
Windows 1.0 required two floppy disks, 256 KB of RAM, and a…
Egregor ransomware forces printers to print a ransom note
Ransomware operators have found a new way to put pressure on the…
Vulnerability in Facebook Messenger allowed spying on Android users
Facebook has patched a critical vulnerability in the Facebook Messenger app for…
Check Point Detects Ransomware Spike on Healthcare Facilities Around the World
Trickbot and Emotet Trojans, Leading the Global Threat Index, Used to Spread…
Experts infiltrated the “old school” IRC botnet and talked to its operator
Confident that he was communicating with fellow hackers, the botnet operator got…
Cisco Webex bugs allow you to invisibly attend someone else’s conference
Three vulnerabilities have been identified in the Webex Meetings product line from…
More than 226 million accounts leaked, Troy Hunt scans the database
Renowned cybersecurity researcher Troy Hunt analyzed a fresh database of compromised data,…
In 67% of cases, Android malware is distributed through the Google Play Store
A large-scale study showed that in 67% of cases, potentially dangerous and…