Cisco Won’t Fix an RCE Vulnerability in Old RV Routers
A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will Not Be…
QNAP Warns Clients About DeadBolt Ransomware Attacks
DeadBolt Ransomware: Another Instance of Ransomware Evolution On June 17, QNAP, the…
SYMBIOTE Backdoor and Rootkit Dropper Revealed
Symbiote Backdoor: a Stealthy and Highly Evasive Linux Malware Researchers at Blackberry…
Internet Explorer shutdown. The Epithaf
On June 15, Microsoft will finally end support for Internet Explorer on…
Team Xecuter’s life. How hackers leave after the arrest?
Gary Bowser, the Nintendo hacker, appears to be a very happy cybercriminal.…
Companies Manage to Bargain With Ransomware Racketeers
Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (the negotiator) at…
The US Department of Justice Reports a Russian Botnet Dismantled
RSOCKS Russian Botnet Is No More as a Result of a Joint…
10 Types of Cyber Security Attacks in IoT
In a world where information progress is rapidly developing, it is impossible…
Penetration Testing: Stages and Methods
What is penetration testing? Penetration testing is a method by which the…
Around 2000 People Arrested by Interpol for Internet Scams
Operation "First Light" The war on cybercrime goes on. As its next…
VPN, Proxy, or Tor: Differences, Meaning
You've probably heard the words VPN, Proxy, and Tor. You may even…
BlackCat ransomware gang publishes leaked data on the clear web site
BlackCat/ALPHV group recently announced on its victim shaming and extortion website that…