TrickBot strikes again with new tools
Usually the 100th release is something to celebrate...well, not if it's TrickBot!…
New Bluetooth attack can hijack Tesla Model X in minutes
Tesla is using over the air updates to patch vulnerabilities and add…
Why Is It Important To Have Intrusion Detection And Prevention ?
This article describes why detection and prevention of burglaries must be one…
Experts predict an increase in the number of attacks on Chrome users
Most users are running outdated versions of Chrome that contain a recent…
Spotify accounts hacked
According to vpnMentor’s research team, a possible credential stuffing operation whose origins are…
RCE vulnerability found in CWA app to track COVID-19 spread
An issue has been identified in the infrastructure that powers the Corona-Warn-App…
PoC Code Publishing Gives Attackers 47 Days Head Start
Early disclosure of PoC code can help the cybersecurity community and push…
Hacker put HIV / AIDS patient data on sale
In addition, he states that he can obtain databases of HIV and…
35 years ago, in 1985, the legendary Windows 1.0 appeared
Windows 1.0 required two floppy disks, 256 KB of RAM, and a…
Egregor ransomware forces printers to print a ransom note
Ransomware operators have found a new way to put pressure on the…