The much-awaited Call of Duty Mobile is here on Android and iOS devices. The game is brought to mobile with a familiar...
Researchers discovered a “Blackwater” malware campaign that suspected to associated with well known MuddyWater APT bypass the security control and install a...
Intel Corp., Broadcom Inc., Qualcomm Inc., Xilinx Inc., etc., have also refused to supply critical components and software to Huawei. The US...
Stack Overflow has just announced that it has been the victim of a hacking attack that has given the threat actors access...
Stack Overflow, a question & answer based site for professional and programmers founded in 2008 reported a security breach. The company confirmed...
In a brief announcement yesterday, Stack Overflow reports that it was the target of an attack that led hackers to access its...
Chinese hackers then used NSA’s hacking tools and technology to target American allies. Symantec researchers have discovered that in 2016, Chinese intelligence...
A WiFi camera (model DCS-2123L) designed by the manufacturer D-Link contains critical vulnerabilities that would allow a hacker to intercept and visualize...
Cyber forensics course specialists report the presence of a new vulnerability in the SupportAssist tool, of the computer equipment manufacturer Dell; the...
Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed from their...
It is extremely easy to access the dark web and even easier to be detected on it if you don’t take precautions....
In recent days, a still not identified hacker group got unauthorized access to a Docker database, a company dedicated to programmer software...
Docker Hub Hacked, sensitive data more than 190,000 accounts may have exposed. Docker Hub discovered the unauthorized access to a single Hub...
Cyber forensics course specialists report that WiFi Finder developers, an app for Android operating system, have just leaked more than two million...
Russia’s censorship agency, Roskomnadzor, has demanded 10 VPN service providers to link their Russian servers to the network of the agency. This...
Researchers discovered a new malicious campaign called “Sea Turtle,” attack public and private entities in various countries using DNS hijacking as a...
Cyber criminals launching a new malware campaign that make use of legitimate script engine AutoHotkey with a malicious script to evade detection...
Microsoft announced a data breach by unknown hackers who have compromised the Microsoft technical support agent’s credentials and gain access to some...
If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by...
A critical flaw in Box.com cloud-storage solution was recently discovered that make files stored in the service accessible by external unauthorized users...
Local government officials had to pay almost half a million dollars to regain access to their systems According to network security and ethical hacking...