Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers…
Hackers actively use driver signature spoofing, which originates from a loophole in Windows kernel-mode drivers handling mechanism. They heavily bear…
Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise…
After hundreds of companies were attacked with a 0-day vulnerability in MOVEit Transfer, the developer of this file transfer management…
Rambler Gallo, a resident of Tracy, Calif., has been charged with maliciously damaging a computer after it allegedly infiltrated a…
The Security Service of Ukraine (SBU) announced the arrest of…
Bleeping Computer reported that cybersecurity researcher has published an exploit…
A team of researchers from the National University of Singapore…
Analysts at Digital Shadows have prepared a report on the…
Researchers have unveiled a new fuzzing attack technique, Blacksmith, which…
Last weekend, unknown hackers managed to break into the mail…
The NCC Group warns of a spike of Clop ransomware…
Forescout and Medigate Labs issued a report on NUCLEUS:13 problems…
Law enforcement agencies, as well as European and American authorities,…
The US government has offered a $10,000,000 reward for any…
Scientists at the University of Cambridge, Ross Anderson and Nicholas…
The hackers behind the BlackMatter ransomware the termination of activity…