- Advertisement -
ARCHIVE
Monthly Archives: February, 2022
War Between Russia and Ukraine Goes Cyber
The war between Russia and Ukraine goes "Cyber", with several ongoing cyber-attacks from the Russian side, targeting Ukraine's banks and government department websites.
A cyber...
Update Chrome Now to Patch an Actively Exploited Zero-Day Vulnerability
Google has released an update for its Chrome browser that includes eleven security fixes, one of which has been reportedly exploited in the wild....
A New Tool to Help You Reveal Sensitive Information
Bishop Fox have released a new tool to help you reveal sensitive information which has been redacted by the method of pixelation from a...
New Vulnerabilities Allow Hackers to Crash Siemens PLCs
Independent ICS security researcher Gao Jian recently discovered new vulnerabilities which can allow hackers to remotely crash Siemens PLCs.
The vulnerabilities have been reported...
Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining
Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure.
VMTD to Help Identify...
Oil Port Terminal Operations Disrupted by Ransomware Attack
The ransomware attack affected dozens of terminals, oil storage and transport around the world, including Oiltanking in Germany, SEA-Invest in Belgium and Evos in...
Best Privacy Browsing Apps for Android
You are using your phone to browse the internet probably more than you are using your desktop or laptop computer.
If you want to avoid...
Hacker Took Down the Internet in North Korea
An American hacker named P4x says he was behind a series of outages in North Korea's Internet a few weeks ago.
P4x told Wired...
$320 Million Stolen from Crypto Trading Platform
By exploiting a vulnerability in the software of a crypto trading platform, hackers stole 320 million in cryptocurrencies.
Wormhole Portal is a web-based application that...
Hackers Use PowerPoint Files to Deliver Malicious Files
A little-known PowerPoint add-on, the .ppam file, has been used by hackers to hide and deliver malicious files.
Security researchers from Avanan, observed that .ppam...
Latest news
- Advertisement -