Articles
Ho.mobile Data Breach – Ho.Mobile Users Data are being Sold on Darknet
In the last days of 2020, rumors about the theft of data from 2.5 million ho.mobile users have raised many concerns, and it seems that the...
Articles
Microsoft Edge browser will warn users about “leaked” passwords
The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords will allow users to receive...
Articles
Microsoft: SolarWinds hackers hunted for access to cloud resources
Microsoft analysts continue to study the supply chain attack that SolarWinds and its customers have been hit this year. Let me remind you that unknown attackers attacked...
Articles
Microsoft has identified the ultimate target of hackers hacked into SolarWinds
According to Microsoft experts, the ultimate goal of the hackers who hacked SolarWinds was to gain access to the cloud assets of the victims...
Articles
Whirlpool became a victim of Nefilim operators, part of the data was leaked to the Network
The American corporation Whirlpool, one of the largest manufacturers of household appliances in the world, closes 2020 with a not very pleasant incident: the...
Articles
Google Docs Vulnerability allowed to view other people’s documents
Google has patched a vulnerability in its feedback tool used in its services. The vulnerability made it possible to steal screenshots of confidential documents from...
Articles
Cyberattack on FireEye was detected due to a hacker Mistake
US officials and cybersecurity experts investigating major Treasury and FireEye hacks believe the cyberattacks were ultimately discovered due to a mistake hackers made while moving through a...
Articles
Huawei’s first beta Harmony OS looks suspiciously like Android
The Harmony OS mobile operating system is the first OS from Huawei. It is supposed to replace Android on the company's smartphones, since the current...
Latest news
Microsoft Edge browser will warn users about “leaked” passwords
The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...
NAME: WRECK vulnerabilities threaten millions of IoT devices
Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...
Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken
The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Machine Learning in Malware Analysis
Many different deep network architectures have been suggested by...
Domain used in SolarWinds attack turned into backdoor switch
Security experts have seized control of a key malicious...
Developers of popular Android applications forgot to fix a dangerous vulnerability
About 8% of Android apps available in the official...