The consequences of exploiting a 0-day vulnerability in MOVEit Transfer’s file transfer management solution continue to spread. The total number…
In June of this year, a new wave of cyber-attacks and extortion operations, organized by the criminal group 8Base, swept…
Deep Instinct specialists spoke about a new JavaScript dropper called PindOS (such a “self-name” was found in the malware code…
Check Point analysts found that Chinese hackers in a chain of accidents infected an unnamed European hospital with malware. Researchers…
The Super Mario video game franchise has gained immense acclaim due to its platforming gameplay, lively visuals, memorable characters. Recently,…
NASA has identified more than 6000 different cyberattacks over the…
Microsoft has fixed a bug in Windows 10 that changed…
The researcher found that for several months Mozilla Thunderbird saved…
Experts from the National Agency for Information Systems Security (ANSSI)…
As part of the May “Patch Tuesday” Microsoft has fixed…
Microsoft has developed an open source SimuLand lab environment to…
Microsoft has announced quite categorically that it will finally stop…
The head of Colonial Pipeline confirmed that the company paid…
After the sensational cyberattack on the American fuel giant Colonial…
Manufacturers of various Wi-Fi-enabled equipment and software developers for this…
The administration of the popular hacker forum XSS (formerly DaMaGeLab)…
Pontus Johnson, a professor at the Royal Institute of Technology…