Most recent articles by:

Threat IT Staff

Pentagon blacklisted Xiaomi for linking with the Chinese army

The US Department of Defense has added several new organizations to the list of companies allegedly associated with the PRC military sector, including the...

Hackers of US government agencies used software used by Russian hackers

The hackers hacked the IT systems of US government agencies using tools used by the Russian cybercriminal group Turla. This is stated in a study...

Nissan source code leaked due to admin: admin credentials

The source code of mobile applications and internal tools of the North American division of Nissan has been leaked to the network. The leak occurred...

The hyundai.ru user database is up for sale on the shadow forum

According to the telegram channel of information leakage , an announcement on the sale of a database containing data of 1.3 million registered users of the...

Attackers start using Zyxel backdoor account in attacks

Cyber criminals scan the Web, hoping to find open SSH devices and infiltrate them using hard-coded credentials. We are talking about the so-called backdoor...

Vulnerability in Telegram allows to determine the user’s location

The Telegram messenger provides users with the People Nearby function, thanks to which it is possible to determine the location of the social network...

American special services named the target of the attack of Russian hackers

The Federal Bureau of Investigation (FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and the US Intelligence Community (ODNI) admitted Russia's involvement in...

Microsoft’s Windows Core Polaris OS build leaked online

A build of Windows Core Polaris for developers leaked online, confirming once again that Microsoft is actively working on a separate operating system for...