A group of scientists from five American universities has developed a side-channel EarSpy attack that can be used to eavesdrop…
Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks. After Microsoft began…
Malware operators and other hackers are increasingly abusing Google Ads to distribute malware to users who are looking for popular…
LastPass password manager developers have reported that hackers who recently broke into the company’s cloud storage have accessed it and…
The Raspberry Robin worm uses new tactics to evade detection and seeks to confuse security experts if it runs in…
Microsoft said Windows 7 users would not receive a patch…
Safebreach Labs reported that attackers could use the Windows Encrypting…
Earlier this week, Microsoft announced about vulnerability in Internet Explorer,…
Organizations are more likely to become victims of state-sponsored cybercriminals.…
Recently, in the public domain appeared exploits for the critical…
Check Point analysts prepared a traditional monthly report on the…
The day after the release of the fix for one…
On January 14, 2020, Microsoft stopped supporting Windows 7 for…
Fancy Bear, also known as APT28, orchestrated an attack on…
Danish researchers have published a report on the Cable Haunt…
Researcher in a few minutes remotely hacked iPhone using only…
Check Point experts found many issues in one of the…