Microsoft is tracking a series of attacks that use SEO poisoning to infect targets with a Remote Access Trojan (RAT) that is capable of stealing victims' sensitive information and
Sergey Toshin - founder of Oversecure company specializing in mobile application security, has found more than a dozen vulnerabilities affecting Samsung devices, allowing hackers
Kaspersky security researchers have discovered a new culprit - PuzzleMaker - who used the Google Chrome and Windows 10 zero-day exploit chain in highly targeted attacks against
Through these vulnerabilities, malicious actors can completely gain higher privileges on the target device.
A cyber attack forced the world's largest meat supplier - JBS. This forced the JBS company to close some factories in the US, Canada and Australia on June 1-2.
Cybersecurity researchers have witnessed a never-before-seen series of Windows ransomware that can infect an unpatched Microsoft Exchange email server and the network of a US-based
Mirai is a malicious code designed to spread through IoT devices. Click to see this article now to learn how to prevent your computer from being infiltrated by malicious codes!
Statistical results show that in the first quarter of 2021 alone, global criminals sent 52 million malicious messages by abusing well-known storage services such as Office 365,
FragAttacks is a newly announced group of security vulnerabilities that can be abused to deploy attacks targeting WiFi devices.
Attackers have exploited the wifi vulnerability to perform data theft and spread malicious code that affects the device.
Adobe has just released the May security update to patch security holes in 12 of their products. Among them is a serious zero-day vulnerability in Adobe Reader that is being
New York University security researcher Mathy Vanhoef discovered FragAttacks - a collection of Wifi security vulnerabilities. FragAttacks is affecting all Wifi devices such as
Scammers are constantly looking for methods to steal user data. They actively spread spam and fraudulent sites related to the Covid-19 pandemic to profit from outstanding news.
A new malware called Panda Stealer is spreading across the web. Panda Stealer can steal cryptocurrencies, including Dash, Bytecoin, Litecoin, and Ethereum.
The information revealed around the legal confrontation between Epic Games and Apple surprised many iPhone users.
Belgium, a country in the European Union (EU), has suffered an unprecedented distributed denial of service (DDoS) campaign.
According to the latest warning from Kaspersky Lab security firm, the number of users attacked by ransomware increased 7 times compared to 2019.
The way the researcher tells an international has just disclosed information about a relatively serious vulnerability that exists in the Linux kernel, which can be exploited to
Microsoft security researchers announced that they discovered more than two dozen serious remote code execution (RCE) vulnerabilities related to Internet of Things (IoT) and
VPNs and virtual private networks are increasingly being used by individuals and organizations. However, the insecure of these virtual private networks will lead to serious