20 Dangerous Types of Cybersecurity Threats
The cybersecurity threats in this year are more considerable than ever. Due…
Russian Aviation agency switched to paper documents due to a hacker attack
The media, citing their own sources, report that at the end of…
Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times
This week, Akamai experts discovered a unique DDoS amplification vector that can…
Experts list 15 most attacked Linux vulnerabilities
Trend Micro has published a list of the top threats and most…
NASA has faced 6000 cyberattacks in the past four years
NASA has identified more than 6000 different cyberattacks over the past four…
Microsoft developed a SimuLand lab environment for simulating cyberattacks
Microsoft has developed an open source SimuLand lab environment to help testing…
FBI investigates cyberattacks on two water supply systems in Pennsylvania
Last month, the local Water Action Response Network, which includes utility companies,…
Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks
AdaptiveMobile specialists have published a report on new bugs in the 5G…
Attackers using DCCP protocol for DDoS attacks
Akamai has noticed that attackers are using the little-known DCCP network protocol…
DTLS can amplify DDoS by 37 times
Netscout warns that using of the DTLS vector allows hackers to amplify…
Microsoft: SolarWinds Hackers Stole Source Codes of Azure, Exchange and Intune Components
Microsoft experts announced that they have completed an official investigation of the…
Microsoft Says Over 1,000 Developers Worked on SolarWinds Attack
In an interview with CBSNews, Microsoft President Brad Smith said the recent…