Intel investigates data leak: 20 GB of source codes and documents
Swiss programmer Till Kottmann has been studying various dumps in the public…
US authorities offered $10000000 for information on planned cyberattacks for the elections
Less than 100 days are left before the start of the US…
295 Chrome extensions injected ads in search results
AdGuard analysts have identified 295 malicious extensions in the Chrome Web Store…
Google: 11 0-day vulnerabilities identified in the first half of 2020
Google Project Zero experts estimate that 11 0-day vulnerabilities, actively exploited by…
Media Reports that Garmin Paid Ransom to WastedLocker Malware Operators
In July 2020, Garmin, the manufacturer of wearable electronics and navigation equipment,…
Attacks on EMV cards, which were only a theory for 12 years, noticed in reality
Experts from the Gemini Advisory company published a report, according to which…
Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned
Hacker “Tamagotchi” Flipper Zero hits Kickstarter today. It was required to raise…
Ransomware attack caused Garmin’s four-day services outage
Earlier this week, manufacturer of electronics and navigation equipment Garmin suffered a…
Information security specialists disclosed details of five vulnerabilities in D-Link routers
Loginsoft experts have reported about five serious vulnerabilities found in some models…
Steve Wozniak Sues YouTube Over Cryptocurrency Scammers
Steve Wozniak and more than ten other plaintiffs have sued YouTube over…
DeepSource Developers Talked about Hacking of Their GitHub Application
A popular automated code analysis tool, DeepSource, is designed to identify vulnerabilities,…
Prometei botnet uses SMB for distribution
Cisco Talos has discovered a new botnet, Prometei, which was active since…