Hackers attack Microsoft Exchange servers on behalf of Brian Krebs
The well-known information security expert, journalist and author of the KrebsOnSecurity blog…
New vulnerabilities help to bypass protection from Specter on Linux systems
On Monday, March 29th, security researchers uncovered two vulnerabilities in Linux distributions…
Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks
AdaptiveMobile specialists have published a report on new bugs in the 5G…
Slack Connect DM new feature drew a barrage of criticism
This week Slack Messenger developers announced a new Connect DM feature that…
Attackers using DCCP protocol for DDoS attacks
Akamai has noticed that attackers are using the little-known DCCP network protocol…
Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals
CheckPoint experts found that the number of job search ads on the…
REvil ransomware operators attacked Acer and demand $50,000,000
The REvil ransomware attacked the Taiwanese company Acer (the sixth-largest computer manufacturer…
Russian who tried to hack Tesla was pleaded guilty
The Russian, who offered a Tesla specialist $1,000,000 for installing malware into…
DTLS can amplify DDoS by 37 times
Netscout warns that using of the DTLS vector allows hackers to amplify…
REvil spokesman boasts that hackers have access to ballistic missile launch systems
A Revil representative under the pseudonym Unknown, claims that the hackers, partners…
Microsoft Introduces One-Click ProxyLogon Fix Tool
Microsoft developers have released a tool called EOMT (Exchange On-premises Mitigation Tool)…
Google experts published PoC exploit for Specter that is targeting browsers
Google engineers published a PoC exploit to demonstrate the effectiveness of using…