5G Vulnerabilities is a Great Risk to Users and smartphone
According to information security researchers from Positive Technologies, some 5G networks are at risk…
Positive Technologies products reveal the use of FireEye pentesting tools stolen by hackers
The PT Network Attack Discovery deep traffic analysis system , PT Sandbox sandbox , MaxPatrol 8 security monitoring system, MaxPatrol SIEM incident detection…
Critical WordPress bug in Contact Form 7 plugin – More Than 5,000,000 installations
The developers of the popular Contact Form 7 WordPress plugin, which is…
Trend Micro Vulnerabilities in IWSVA Web Gateway has been Fixed!
The company Trend Micro this week sent out to customers update InterScan…
TikTok quietly leaked Jobseeker data to China
The video clip service TikTok sent personal data of job seekers to…
Cyberpunk 2077 Ransomware?
Cyberpunk 2077 - Just as we tough that 2020 couldn't get any…
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party extensions for Google…
Microsoft detects malicious SolarWinds files on its networks
Microsoft discovered malware on its networks, adding to the list of companies…
Authentication Bypass Vulnerability Discovered in Bouncy Castle Crypto Library
A dangerous vulnerability (CVE-2020-28052) bypass authentication has been found in the popular…
Malware in Ruby Gems repository For Second Time
Sonatype experts have discovered the pretty_color and ruby-bitcoin malicious packages in the official RubyGems…