Last year, an information security specialist discovered dangerous vulnerabilities in Google Home smart speakers that allowed listening to users. problems made it possible to...
News
Experts from the Fox-IT NCC Group warn that thousands of installations of Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway) servers are...
Last summer, Thales Group specialists discovered a critical bug (CVE-2022-47939) in the ksmbd module of the Linux kernel, which was added to the kernel in version 5.15. This bug...
Microsoft specialists spoke in detail about the vulnerability CVE-2022-42821, which could be used to bypass Gatekeeper. week ago, Apple developers fixed an issue, dubbed Achilles...
Microsoft developers have warned that updates for Windows Server released as part of the December “Update Tuesday” may cause errors when creating new virtual machines...
As part of this year’s latest “Patch Tuesday” Microsoft. fixed 49 vulnerabilities, among which the developers have also patched two 0-day vulnerabilities, and...
Resecurity specialists spoke about the new InTheBox marketplace, which is focused on mobile malware operators. site has been operating on the darknet since the beginning of 2020...
Experts discovered three vulnerabilities at once in the AMI MegaRAC BMC (Baseboard Management Controller) software from American Megatrends. The issues affect server hardware used...
Security researchers from DomainTools have discovered a new BlackProxies residential proxy service, which, according to advertising, sells access to a million proxy addresses...
It was found that the certificates that Android OEM manufacturers Samsung, LG and Mediatek use to sign basic system applications were also used to sign malware. me remind you that...
Lookout found more than 280 microloan apps on the Google Play Store and App Store that extorted money from users. these applications, users could take out a loan, but in reality...
Sysdig experts have found that more than 1,600 images on Docker Hub demonstrate various malicious behaviors. They can hide cryptocurrency miners, built-in secrets that can be used...
The data of 5.4 million Twitter users was stolen using an API vulnerability (fixed in January of this year) is now posted for free on a hacker forum. The leaked data includes both...
Google Project Zero experts are alarming, becvause five vulnerabilities in the ARM Mali GPU driver remain unpatched on a variety of devices, although the chipmaker released...
Experts from Proofpoint have released a report on Nighthawk, an advanced C2 framework that hackers can start using instead of Cobalt Strike. observing how the framework was used...















