Featured

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were associated with popular platforms:...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11, were made public in August 2019. Five bugs with the general name CDPwn showed up...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries must be one of the most important aspects of any burglary protection and detection system....

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT infrastructure (Operational Technology) were practically impossible, since everything works in a special network, separate from...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting malware that has the functionality of a worm. The analysis showed that Gitpaste-12, as Juniper...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues, prioritizes the most important (such as network security, network integrity, and network performance), and then...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...

Latest news

50% reduction in Google account hacks after enabling 2SV

One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures. It...

Dangerous vulnerability has been discovered in the latest version of the OpenSSL library

The vulnerability was discovered in the latest version of OpenSSL 3.0.4 , which was released on June 21, 2022 and affects...

Chrome 103 fixes 14 vulnerabilities

This week, Google developers released a stable version of Chrome 103 , which fixed 14 vulnerabilities. Independent researchers who uncovered some of...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Hackers who hacked cybersecurity companies are back again after five years

As part of Operation #LeakTheAnalyst, hackers allegedly hacked into...

Check Point Detects Ransomware Spike on Healthcare Facilities Around the World

Trickbot and Emotet Trojans, Leading the Global Threat Index,...

Microsoft Azure open to New Vulnerabilities

Two brand new vulnerabilities related to Microsoft Azure have...