This vulnerability was patched shortly after McAfee Enterprise received a report from security researchers.
Recently, the NCSC Cybersecurity Monitoring Center recorded an exploit code for a critical security vulnerability CVE-2022-21907 in Windows' HTTP Protocol Stack.
A new family of ransomware called White Rabbit has just been discovered by researchers. According to research results, it is possible that this ransomware is a side activity of the
The Microsoft security team recently issued a warning about a vulnerability that exists in a bug in Apple's Transparency, Consent and Control (TCC) technology. TCC is a technology
Glopbeta is a dangerous type of malware with the ability to steal user information and cookies, mine virtual currency, deploy and operate proxy components... It usually targets
A dangerous type of malicious code, capable of mutating itself to avoid security software, is attacking vaccine manufacturing and supply companies globally.
International security researchers have recently issued an urgent warning about a new phishing attack campaign on the TikTok platform.
AMD has just published a long list of security flaws and corresponding exploits related to their Windows 10 graphics driver updates.
The more the internet world develops, the more forms of cyber attacks are actively changing in a more complicated and dangerous direction.
An unidentified group of hackers is selling a package of stolen databases containing 50 million records of data related to transportation activities in Moscow, Russia.
It looks like the streaming service Twitch has been hacked recently. An anonymous person uploaded a 125GB torrent file containing many important Twitch data on 4chan.
An international team of security researchers has publicly disclosed a new vulnerability that exists in Apple's macOS Finder.
A constantly growing DDoS botnet has targeted Russian search engine Yandex for over a month.
In a recent interview, security expert Viktor Chebyshev shared about a virus on Android devices with the ability to automatically steal money from victims.
A new vulnerability has just been discovered by a security researcher on the Microsoft Outlook platform.
Hackers can easily take advantage of existing vulnerabilities in the Bluetooth protocol to deploy many different violating activities.
Taking advantage of the interest of users, cybercriminals are deploying Windows 11-themed phishing campaigns.
Apple has switched to using the USB-C connection standard on the latest generation of iPad Pro, and this should probably be applied to new iPhone models soon as well. This not only
One of the aspects that make cybercriminals dangerous lies in the initiative they take in deploying new forms of malicious attacks.
The hacker group behind a new ransomware called LockFile has encrypted Windows domains after hacking into Microsoft Exchange servers with the ProxyShell vulnerability.