A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue…
Security researchers have noticed that by using text prompts embedded in web pages, hackers can force Bing’s AI chatbot to…
Companies tend to hide the case of a cybersecurity breach – for certain reasons, it may be for their good.…
ESET experts reported that the BlackLotus UEFI bootkit, which is sold on hacker forums for about $ 5,000, is indeed…
Cybercriminals periodically develop something new. Sometimes it is an updated version of already known malware, and sometimes it is something…
In Europe were attacked super powerful computers at universities and…
Bitdefender experts found Mandrake spyware in the official Android app…
ESET analysts discovered the infrastructure of a previously unknown Ramsay…
Cybersecurity and Infrastructure Protection Agency (CISA), part of the US…
In the Telegram channel of the head of DeviceLock company…
Hackers attacked the company Stadler. A well-known Swiss train manufacturer…
The Cereals IoT botnet appeared in 2012, and reached its…
Fresenius, Europe’s largest private hospital operator and major provider of…
Recently, India’s technology giant Jio, partly acquired by Facebook, has…
According to the development team of the Ghost blogging platform,…
Last Friday, President Trump declared a state of emergency in…
ESET analysts warned about surge in the activity of the…