Security researchers have discovered a new and massive cyber espionage campaign by copykittens hackers, especially aimed at people working in government organizations,...
Veritaseum Ethereum platform confirmed today that a hacker was able to steal millions of $ 8.4 from the ICO Ethereum (Coin Initial...
After episodes of WannaCry and Petya ransomware, a new LeakerLocker ransomware (but creative) is spreading through special applications from the Google Play...
Reliance Jio Sim Data Breach, Personal data of about 120 million customers were reported exposed on the Internet probably the largest personal...
A new malware called CopyCat malware hit more than 14 million Android devices around the world, rooting phones and kidnapping applications to...
One of the biggest exchanges and cryptocurrencies Ether Bitcoin worlds, Bithumb has recently been violated, resulting in a loss of Over $1...
SQL Injection Vulnerability Found in WordPress plugin, WP Statistics is one of the most popular WordPress plugins installed on 300,000 websites. The...
A critical loophole has been discovered in SystemD, the popular first character system and service manager for Linux operating systems, which can...
Is Petya ransomware defective or too smart? Petya Ransomware is a nasty piece of malware that, unlike other traditional ransomware, does not...
In the new ransom attack (Petya Ransomware) is currently attacking a large number of countries all over the world, including Ukraine, the...
UK Parliament Hit by Cyberattack Hackers attempted to access MP emails, gentlemen and staff and security services are to stop access for anyone...
Information Has exposed Data of 200 Million Voters Compromised On Unsecured Server and more than 60% of the US population to what...
The US government issued a warning about a rare piracy operation going on in North Korea last eight years. He presented the...
Over 800 different Android apps downloaded millions of times from the Google Play store, which was infected with a malicious ad library...
SambaCry uses weaknesses in Samba’s facilities to make Linux machine concessions and use them as victims in the process of extracting decoded...
Security researchers have discovered a new intelligent way (DoubleSwitch) currently used by attackers to take over Twitter accounts verified and rename famous...
A new Roaring Android rooting malware has been detected with the ability to disable device security settings in an attempt to perform...
Intel AMT Vulnerability SOL detected hidden network interface This is the result of the Intel AMT Vulnerability SOL component of Intel ME...
IBM security researchers Qakbot Virus many Active Directory domains, the user can block his business found. Active Directory is a directory developed...
“Pandemic”, as the implant is coded, to install malicious file server software in the secret of the CIA by the carrier, according...
Password Manager using the OneLogin? If you just change your account password for all. OneLogin, password management and word-based identity management software...