Critical Google vulnerability puts Microsoft music lovers at risk.
On August 19, Microsoft released technical details about a critical ChromeOS vulnerability…
The media industry is the most vulnerable sector to cyberattacks
Companies in the media industry are very slow in fixing vulnerabilities, leaving…
Researchers Say VPN on iOS Still Doesn’t Work Well
A few years ago, engineers at Proton Technologies, the company behind ProtonMail…
Over 80,000 Hikvision cameras are vulnerable
Information security researchers report that more than 80,000 Hikvision cameras can be…
NetSupport and RaccoonStealer malware disguised as Cloudflare warnings
Unidentified hackers are hacking WordPress sites to spread fake DDoS protection notifications…
Details about an 8-year-old bug in the Linux kernel have been released
Experts from Northwestern University have revealed the details of the Dirty Cred…
New vulnerability in Palo Alto Networks PAN-OS is already under attack
The U.S. Infrastructure and Cybersecurity Agency (CISA) has warned that hackers are…
An encrypted ZIP archive can have two valid passwords
Positive Technologies cybersecurity researcher Arseniy Sharoglazov shared an experiment in which he…
The hackers who stole $625 million from Ronin transferred the funds to Bitcoin Network
₿liteZero researcher found out that Ronin hackers transferred stolen assets from Ethereum…
More than 200 packages with miners for Linux systems found in the PyPI and npm repositories
Experts again found malware in the PyPI and npm repositories. This time…