
The Joker, one of the most persistent and dangerous strains of malware targeting Android devices, has just been discovered.

APKPure, one of the world's largest online app stores, a Google Play Store alternative, has been identified as infected with a dangerous strain of malware.

LinkedIn is a social network for the business community and is currently widely used by many users. About 500 million LinkedIn users have been exposed to personal information.

The series of security flaws that have existed for a long time in Microsoft Exchange and have only recently been patched have attracted a lot of attention from both users and

Data breach notification service Have I Been Pwned can now check to see if your personal information was exposed in the data leak of more than 500 million Facebook users on April

This is indeed a worrying 'lethargy', especially given the recent increase in the number of attacks targeting system software.

Recently, international security researchers are noticing an increasing trend in threat agent cases targeting the gaming community.

Declared decommissioning and returning the ransom to the victim are certainly extremely rare in the world of ransomware.

NAS (Network Attached Storage), also known as a network hard drive, is a device that is installed to serve the needs of storing or accessing data.

The malware can disguise itself as a system update and is designed to automatically activate whenever new information is entered into a device.

Apple just released a series of security updates aimed at addressing a relatively serious zero-day vulnerability on iOS.

Microsoft security experts issue an important warning about an ongoing large-scale phishing, targeting Outlook Web App (OWA) services and Office 365.

Purple Fox, a strain of malware that was once spread around the world through sophisticated phishing email and exploit kits, has just shown signs of reappearing in a dangerous and

A cybersecurity expert has made a stir in security circles by revealing a relatively detailed method of hiding up to 3MB of data inside an image on the social networking platform

We all know that the cybercrime world is constantly moving, parallel and has a close relationship with the development of the internet in general. That is why new hacking

Vulnerabilities are currently being tracked with identifiers CVE-2021-27365, CVE-2021-27363, and CVE-2021-27364.

International cybersecurity researchers recently found two completely new types of ransomware that are quite strange. They carry very different and rarely recorded features, which

Microsoft has just released a new update to MSERT, which comes with the ability to detect web shells deployed in recent Exchange Server attacks.

International security researchers have just stumbled upon a strain of ransomware that possesses rather strange behavior. Called 'Hog', this ransomware still enters the system and

Phishing attack is probably a term that is not unfamiliar to most internet users. In fact, it is also one of the most common forms of cyberattacks.