Chainalysis: Over the past six months, $ 2 billion was stolen through hacking of inter-network bridges
Chainalysis estimated the damage from hacking cross-chain protocols since the beginning of…
Google Fixes Critical Vulnerability Allowing Arbitrary Code Execution Over Bluetooth
The vulnerability was fixed in updates for Android 12 and 12L. A…
Hackers stole passwords from 140,000 Wiseasy payment terminals
Cybercriminals have gained access to dashboards used to remotely control thousands of…
Dangerous privilege escalation vulnerability found in Kaspersky product
An attacker can activate "God Mode" on an organization's network Synopsys has…
3 XSS vulnerabilities can lead to a complete shutdown of the system
Web development applications contain bugs that allow you to execute any command…
Single-core processor cracked post-quantum cryptography algorithm in 1 hour
A computer with an Intel Xeon processor cracked an encryption algorithm in…
VirusTotal showed which applications are most often disguised as malware
VirusTotal showed which applications are most often disguised as malware Alexander Antipov…
Red Fist DDoS Attacks Crush Taiwan Government Websites
Taiwan Presidential Office spokesman Chang Tun-Khan said the president's official website was…
Cheap and cheerful: a new Dark Utilities service has been discovered offering services for creating C&C servers
For 9.99 euros, hackers get a C&C infrastructure with all the necessary…
Medvedev: US creates cyber centers for attacks on Russia
United States in the cyber war with the Russian Federation is not…