On November 28, 2022, information regarding a new WhatsApp breach appeared. The hacker offers a database with stolen data for…
The NordPass password manager team has prepared annual statistics by analysing the most commonly used and weakest passwords of 2022.…
According to cybersecurity specialists from Cyble, attackers distribute miners and the RedLine infostealer using download sites for the fake MSI…
A Windows malware designed to steal cryptocurrency and clipboard contents installs a malicious VenomSoftX Chrome extension on users’ machines. The…
Experts warned that an exploit for two high-profile vulnerabilities in Microsoft Exchange, which are collectively called ProxyNotShell, has appeared in…
The New York Times reported that the ToTok messenger turned…
An international team of scientists from the University of St.…
Sophos researchers noticed that the MyKingz botnet, also known as…
Password meter services, implemented on many popular platforms, can be…
Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ:…
French law enforcement agencies are looking in Ukraine for developers…
Do you like chatting in groups of interest? Are you…
On July 18, 2018, the European Commission announced that it…
A new variant of the Smoke Loader malware has been…
First, it’s important to understand that Microsoft ended support for…
Computer viruses are really similar to real-life ones. They can…
One of the biggest breaches of databases happened recently –…