Bughunter stole a Monero exploit from another cybersecurity specialist and received a reward for it
Bleeping Computer reporters drew attention to an interesting case that occurred as…
P2P botnet Interplanetary Storm accounts more than 9000 devices
Bitdefender experts gave a detailed description of the work of the P2P…
Google revealed the most powerful DDoS attack in history
This week, the Google Cloud team talked about a previously unknown DDoS…
Google and Intel experts warn of dangerous Bluetooth bugs in Linux
Google and Intel engineers warn of dangerous Bluetooth bugs that threaten all…
Hackers are increasingly using open source tools for attacks
Speaking at the Virus Bulletin conference, Intezer Labs analysts said that hackers…
Attackers can use Windows Update client to execute malicious code
Hackers can exploit Windows Update client to execute malicious code on the…
Five Eyes Alliance, India and Japan Call for Backdoors in Software
Countries participating in the Five Eyes Alliance (which brings together intelligence agencies…
MalLocker ransomware easily tricks Russians, pretending to be a screen lock from the police
Microsoft experts talked about the new Android ransomware AndroidOS/MalLocker. (hereinafter simply MalLocker),…
Cellmate men’s chastity belts are vulnerable to attacks and dangerous for users
Pen Test Partners analysts have studied an extremely unusual device: the Cellmate…
Researchers discovered four npm packages that were collecting user data
Sonatype identified four npm packages that collected and sent to their creator's…
US authorities arrested legendary John McAfee for tax avoidance
The US Department of Justice reported that the legendary John McAfee was…
Google recruits a team of experts to find bugs in Android applications
ZDNet reports that a number of new positions have been added to…