As a result of one of the most revealing cybersecurity investigations in recent times, the co-founder of Mitto AS, a well-known company...
We all know that social media platforms and instant messaging services are really unfriendly to the privacy of their users, although we...
With this flaw, FatPipe joins the list of VPN providers that have faced a similar situation in the past, including Fortinet, Cisco,...
GoDaddy detected unauthorized access to its systems where it hosts and manages its customers’ WordPress servers. The Scottsdale, Arizona-based web registrar and...
Brazil-based WiFi management software firm WSpot exposed extensive details of high-profile firms and millions of customers. WSpot provides software to let businesses...
In total, researchers have identified around 190 malware-infected games, some of which were designed to specifically target Russian users, whereas some targeted...
The vulnerability existed in the WP Reset PRO WordPress plugin which is used by more than 400,000 websites. The IT security researchers...
The malware is currently targeting Linux-embedded routers and IoT devices through botnets. The IT security researchers at AT&T Alien Labs have tracked...
Big data analytics can be directed to several use cases, like marketing, talent management, sales forecasting, or in this case, cybersecurity. Let’s...
Exploiting these vulnerabilities, a remote attacker could also execute arbitrary code on the server using root-user privileges. The cybersecurity researchers at Positive...
The ProxyShell vulnerabilities have prompted threat actors to launch domain-wide ransomware attacks against their targets, revealed a new research report from The...
Bad news for the cybersecurity fraternity. Emotet malware that was dubbed the “World’s Most Dangerous” and “Widely Spread Malware” is back. As...
The database was left exposed on an Elasticsearch Cluster without any password or security authentication. StripChat is one of the top five...
The vulnerability can be exploited by attackers with physical access to the CPU to breach the security protocols and obtain sensitive information....
”123456” remains the most used and one of the worst passwords of 2021. If you are one of those who believed in...
The operators of the dangerous Emotet malware attacked again after almost a year of inactivity, this time in the form of a...
Recent research details a method to exploit a security flaw in the Amazon Web Services (AWS) API Gateway through an HTTP header...
Cybersecurity specialists described a new method to hide backdoors hidden in JavaScript thanks to the use of Unicode characters that are invisible...
According to a report by Trend Micro, the hacking group identified as TeamTNT has been attacking Docker servers with exposed REST APIs...
While examining Wi-Fi networks in Tel Aviv, Israel, 70% or around three-quarters of home and small-scale office Wi-Fi network passwords were vulnerable...
Trojan Source attack impacts all popular programming language compilers, such as C, C++, C#, Java, JavaScript, Python, Rust, and Go. A research...