admin
November 1, 2022
Microsoft on Tuesday said it addressed an authentication bypass vulnerability in Jupyter Notebooks for Azure Cosmos DB that enabled...
admin
November 1, 2022
The Chinese state-sponsored threat actor known as Stone Panda has been observed employing a new stealthy infection...
admin
November 1, 2022
Linus Torvalds, the creator of Linux and Git, has his own law in software development, and it...
admin
October 31, 2022
An unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows that...
admin
October 31, 2022
The threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal.
This...
admin
October 31, 2022
In today's world of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR...
admin
October 31, 2022
A now-patched security flaw has been disclosed in the Galaxy Store app for Samsung devices that could...
admin
October 31, 2022
Cloud-based repository hosting service GitHub has addressed a high-severity security flaw that could have been exploited to...
admin
October 29, 2022
Communication services provider Twilio this week disclosed that it experienced another "brief security incident" in June 2022...
admin
October 28, 2022
Multiple high-severity security flaws have been disclosed as affecting Juniper Networks devices, some of which could be...
admin
October 28, 2022
Five malicious dropper Android apps with over 130,000 cumulative installations have been discovered on the Google Play...
admin
October 28, 2022
Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a...
admin
October 28, 2022
A recently discovered hacking group known for targeting employees dealing with corporate transactions has been linked to...
admin
October 28, 2022
The increased use of information technology in our everyday life and business has led to cyber-attacks becoming...
admin
October 28, 2022
Google on Thursday rolled out emergency fixes to contain an actively exploited zero-day flaw in its Chrome...
admin
October 28, 2022
The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware.
It...
admin
October 27, 2022
A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web marketplace called The...
admin
October 27, 2022
As many as 85 command-and-control (C2) servers have been discovered supported by the ShadowPad malware since September 2021, with...
admin
October 27, 2022
Automobile, Energy, Media, Ransomware?When thinking about verticals, one may not instantly think of cyber-criminality. Yet, every move...
admin
October 27, 2022
A now-patched security flaw in Apple's iOS and macOS operating systems could have potentially enabled apps with...