Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed for free on GitHub. It turned out that the creator…
Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software…
Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car…
The FBI and the U.S. Infrastructure and Cyber Security Agency (CISA) report that as of August 2022, Cuba ransomware operators…
Mandiant specialists talk about an unusual malware campaign affecting targets in Southeast Asia, when cyber spies use USB devices as…
Avast analysts suddenly got the source codes for the GhostDNS…
Researchers from the Trend Micro Zero Day Initiative (ZDI) team…
NortonLifeLock, which appeared after Symantec sold its information security division…
In Europe were attacked super powerful computers at universities and…
Bitdefender experts found Mandrake spyware in the official Android app…
ESET analysts discovered the infrastructure of a previously unknown Ramsay…
Cybersecurity and Infrastructure Protection Agency (CISA), part of the US…
In the Telegram channel of the head of DeviceLock company…
Hackers attacked the company Stadler. A well-known Swiss train manufacturer…
The Cereals IoT botnet appeared in 2012, and reached its…
Fresenius, Europe’s largest private hospital operator and major provider of…
Recently, India’s technology giant Jio, partly acquired by Facebook, has…