Cyber Security

Google urged Chromium developers to ditch Windows 7

Eleven months after Microsoft officially ended technical support for the Windows 7 operating system, Google finally called on the Chromium developers to stop using the OS. “I...

SUPERNOVA Backdoor Deployed to SolarWinds Orion via Zero-Day Vulnerability

According to a new notice from the US-CERT Coordination Center, hackers exploited a zero-day vulnerability to deploy the SUPERNOVA backdoor on the SolarWinds Orion platform. Vulnerability CVE-2020-10148 affects SolarWinds...

New malware downloads Cobalt Strike via PNG image from Imgur

A security researcher using the Arkbird alias talked about a new malware that uses Word files with macros to download PowerShell scripts from GitHub. The script additionally...

Linux kernel vulnerability endangers web servers and Android devices

Linux web servers and millions of Android devices are at risk due to a Linux kernel vulnerability that affects the pseudo-random number generator and...

Bitcoin price on the Livecoin exchange has risen above $ 450,000. Administration announced the attack

The administration of the cryptocurrency exchange Livecoin, which has been operating since 2014, said that the resource suffered from a carefully planned attack, as...

Citrix products are used in DDoS attacks, but no patch yet

Last week, German systems administrator Marko Hoffman noticed that hackers have found a way to use Citrix ADC network equipment with EDT enabled to amplify DDoS...

Cyberpunk 2077 Android Ransomware ! Encrypt ALL Android Files!

ThreatIT Reports for the second time after ThreatIT first article about CyberPunk2077 and after Kaspersky Lab specialists discovered malware that was disguised as a beta version...

Tools Stolen from FireEye Could Hack Millions of Devices

Vulnerabilities that use penetration testing tools stolen from FireEye in an attack on IT provider SolarWinds have not yet been patched on millions of...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Microsoft November patches: 17 critical holes, one with an exploit

The November patch set from Microsoft looks serious, as...

AIR-FI is the New Attack Method For Wifi Hacking!

A cybersecurity expert demonstrated a new way to extract...