1.7 C
Paris
Sunday, January 29, 2023
- Advertisement -spot_img

ARCHIVE

Monthly Archives: February, 2022

War Between Russia and Ukraine Goes Cyber

The war between Russia and Ukraine goes "Cyber", with several ongoing cyber-attacks from the Russian side, targeting Ukraine's banks and government department websites. A cyber...

Update Chrome Now to Patch an Actively Exploited Zero-Day Vulnerability

Google has released an update for its Chrome browser that includes eleven security fixes, one of which has been reportedly exploited in the wild....

A New Tool to Help You Reveal Sensitive Information

Bishop Fox have released a new tool to help you reveal sensitive information which has been redacted by the method of pixelation from a...

New Vulnerabilities Allow Hackers to Crash Siemens PLCs

Independent ICS security researcher Gao Jian recently discovered new vulnerabilities which can allow hackers to remotely crash Siemens PLCs. The vulnerabilities have been reported...

Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining

Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure. VMTD to Help Identify...

Oil Port Terminal Operations Disrupted by Ransomware Attack

The ransomware attack affected dozens of terminals, oil storage and transport around the world, including Oiltanking in Germany, SEA-Invest in Belgium and Evos in...

Best Privacy Browsing Apps for Android

You are using your phone to browse the internet probably more than you are using your desktop or laptop computer. If you want to avoid...

Hacker Took Down the Internet in North Korea

An American hacker named P4x says he was behind a series of outages in North Korea's Internet a few weeks ago. P4x told Wired...

$320 Million Stolen from Crypto Trading Platform

By exploiting a vulnerability in the software of a crypto trading platform, hackers stole 320 million in cryptocurrencies. Wormhole Portal is a web-based application that...

Hackers Use PowerPoint Files to Deliver Malicious Files

A little-known PowerPoint add-on, the .ppam file, has been used by hackers to hide and deliver malicious files. Security researchers from Avanan, observed that .ppam...

Latest news

- Advertisement -spot_img