Google cloud services are used for phishing
Attackers, whose main goal is to steal various credentials, are increasingly turning…
REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider
Last weekend, one of Argentina's largest internet providers, Telecom Argentina, suffered from…
BadPower attack can set devices on fire
Chinese experts from Xuanwu Lab (research arm of Tencent) have published a…
BlackRock Trojan steals passwords and card data from 337 applications on Android OS
Researchers from ThreatFabric have published a report on the study of a…
For RECON vulnerability appeared PoC exploit
Earlier this week, it became known that SAP engineers fixed the dangerous…
On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities
As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities…
Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code
More recently, we talked that the IT community has also returned to…
NightLion hacker claims to have hacked DataViper information security company
A hacker, hiding under the pseudonym NightLion, claims that has exploded the…
Analysts say that over 5 billion unique credentials can be found on the black market
Analysts at Digital Shadows have estimated that there are currently more than…
Google Unveiled a Source Code for Tsunami Vulnerability Scanner
Google has unveiled the source code for the Tsunami scanner, a scalable…
Mozilla suspended Firefox Send service due to abuse and malware
Journalists from ZDNet drew attention of Mozilla engineers to numerous abuses of…
Scientists have introduced a new algorithm for protection against deepfakes
Scientists from Boston University have introduced a new algorithm for protection against…