Researchers published research detailing a method for taking control of smart speakers, which would allow threat actors to make phone calls, access...
Facial Liveness Verification (FLV) technology is one of the most modern security implementations, currently used for identity authentication in web domains that...
A bug in the Hive ransomware encryption algorithm would allow victims to recover their information without having to negotiate with hackers. This...
Any hacking group could be sentenced to 25 years in prison for their cyberattack campaigns targeting critical infrastructure in Australia. Under the...
A security alert issued by the Federal Bureau of Investigation (FBI) signals the detection of a wave of the attack known as...
Dozens of Mac device users report that the Zoom video conferencing app keeps their devices’ microphone on even when the app isn’t...
Microsoft has developed multiple protection mechanisms against some popular hacking variants, including the malicious use of macros. Sometimes, threat actors send Office...
In a recent report, the Federal Bureau of Investigation (FBI) Director Christopher Wray attributes responsibility for the largest cyberattack campaigns to the...
A new research methodology has allowed specialists to track active vendors in several dark web platformsbased solely on how they write their...
Cybersecurity specialists from Akamai reported the detection of a malicious campaign based on the abuse of Universal Plug and Play (UPnP) protocols...
This week, Microsoft security teams reported the discovery of a phishing campaign characterized by the inclusion of a novel technique that consists...
It is no secret to anyone that the most dangerous groups of threat actors in the world are always trying to evolve,...
Updating all the software solutions that we use daily is one of the main cybersecurity practices, since it allows us to keep...
For almost five years, SecureList researchers reported the identification of an Advanced Persistent Threat (APT) group apparently linked to the infamous Lazarus...
For various reasons, during the most recent months multiple illegal platforms on the dark web dedicated to the sale of stolen confidential...
The European Space Agency (ESA) has announced a new program that expects to engage the cybersecurity community to keep critical space systems...
In its latest security alert, the Federal Bureau of Investigation (FBI) warns U.S. citizens that those who have shared their phone numbers...