Cyber Security

Ho.mobile Data Breach – Ho.Mobile Users Data are being Sold on Darknet

In the last days of 2020, rumors about the theft of data from 2.5 million ho.mobile users have raised many concerns, and it seems that the...

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords will allow users to receive...

Microsoft: SolarWinds hackers hunted for access to cloud resources

Microsoft analysts continue to study the supply chain attack that SolarWinds and its customers have been hit this year. Let me remind you that unknown attackers attacked...

Microsoft has identified the ultimate target of hackers hacked into SolarWinds

According to Microsoft experts, the ultimate goal of the hackers who hacked SolarWinds was to gain access to the cloud assets of the victims...

Whirlpool became a victim of Nefilim operators, part of the data was leaked to the Network

The American corporation Whirlpool, one of the largest manufacturers of household appliances in the world, closes 2020 with a not very pleasant incident: the...

Google Docs Vulnerability allowed to view other people’s documents

Google has patched a vulnerability in its feedback tool used in its services. The vulnerability made it possible to steal screenshots of confidential documents from...

Cyberattack on FireEye was detected due to a hacker Mistake

US officials and cybersecurity experts investigating major Treasury and FireEye hacks believe the cyberattacks were ultimately discovered due to a mistake hackers made while moving through a...

Huawei’s first beta Harmony OS looks suspiciously like Android

The Harmony OS mobile operating system is the first OS from Huawei. It is supposed to replace Android on the company's smartphones, since the current...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Machine Learning in Malware Analysis

Many different deep network architectures have been suggested by...

Domain used in SolarWinds attack turned into backdoor switch

Security experts have seized control of a key malicious...