Articles
Nissan source code leaked due to admin: admin credentials
The source code of mobile applications and internal tools of the North American division of Nissan has been leaked to the network. The leak occurred...
Articles
Ho.mobile Data Breach – Ho.Mobile Users Data are being Sold on Darknet
In the last days of 2020, rumors about the theft of data from 2.5 million ho.mobile users have raised many concerns, and it seems that the...
Articles
Microsoft has identified the ultimate target of hackers hacked into SolarWinds
According to Microsoft experts, the ultimate goal of the hackers who hacked SolarWinds was to gain access to the cloud assets of the victims...
Articles
Whirlpool became a victim of Nefilim operators, part of the data was leaked to the Network
The American corporation Whirlpool, one of the largest manufacturers of household appliances in the world, closes 2020 with a not very pleasant incident: the...
Articles
EXMO cryptocurrency exchange was hacked. About 5% of all funds were stolen
British cryptocurrency exchange EXMO has reported that unknown hackers have stolen nearly 5% of its assets, compromising hot wallets. According to official EXMO statistics, the daily trading...
Articles
Ledger Crypto Data Breach – 270,000 Wallet Owners Data has been leaked
A hacker forum found a database containing email addresses and physical addresses of the owners of Ledger hardware wallets, according to Bleeping Computer .
Journalists remind that...
Articles
Codes used by national central banks software leaked to the Network
Banking software codes used by national central banks of different countries have been published in open repositories. The leaked code was developed by CMA, a company...
Articles
Last.fm developers fix credential leak
Due to incorrect configuration of the Symphony PHP application (which ran in debug mode and "leaked" logs), the Last.fm streaming service had a credential...
Latest news
Microsoft Edge browser will warn users about “leaked” passwords
The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...
LastPass for Android found seven built-in trackers
German cybersecurity expert Mike Kuketz noticed that there are seven trackers in the LastPass app for Android that monitor users.
The researcher...
More than 400 phishing campaigns per week were associated with Valentine’s Day
Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Fortinet has fixed vulnerabilities discovered by Positive Technologies
Fortinet has closed four vulnerabilities in FortiWeb identified by...
Scientists turn a robot vacuum cleaner into a spy device
Household robotic vacuum cleaners can be hacked remotely and...
Why Is It Important To Have Intrusion Detection And Prevention ?
This article describes why detection and prevention of burglaries...