Google vice president says “black hat” is not a neutral term
Journalists from ZDNet noticed that during the weekend there was a hot…
Attackers hack Roblox accounts and urge to vote for Trump
According to the ZDNet publication, unknown attackers hack Roblox accounts and leave…
The researcher found that every 142nd password is “123456”
Ata Hakçıl, a Turkish student and independent researcher, has done a great…
US cyber command warned about dangerous vulnerability in PAN-OS
The US cyber command warned that in PAN-OS was discovered a dangerous…
Check Point: hackers exploit BLM theme for attacks
Check Point analysts reported that hackers are actively exploiting the BLM (Black…
Lucifer malware uses many exploits, is engaged in mining and DDoS attacks
Palo Alto Networks experts have prepared a report on Lucifer malware, which…
Evil Corp returns to criminal activity with WastedLocker ransomware
Fox-IT experts talked about the latest activity of the famous hacker group…
Hackers force users to solve CAPTCHA
Microsoft analysts have discovered a malicious campaign, in which hackers force users…
AMD plans to fix SMM Callout bugs in its processors by the end of June
AMD reports that firmware updates will be released for three bugs called…
eBay employees organized persecution and intimidation of a family of bloggers
Six former eBay employees became involved in a strange trial. According to…
Experts discovered Chrome largest spyware installation campaign
Specialists from the company Awake Security reported about currently perhaps the largest…
Vulnerabilities in old GTP protocol could affect 4G and 5G networks
Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling Protocol) could…