I più popolari
Post Recenti
L'awareness a fumetti
Unpatched Unauthorized File Read Vulnerability Affects Microsoft Windows OSThe Hacker News
Unofficial patches have been issued to remediate an improperly patched Windows security vulnerability that could allow information disclosure and local privilege escalation (LPE) on vulnerable systems.
Tracked as CVE-2021-24084 (CVSS score: 5.5), the flaw concerns an information disclosure vulnerability in the Windows Mobile...
Panasonic Suffers Data Breach After Hackers Hack Into Its NetworkThe Hacker News
Japanese consumer electronics giant Panasonic has disclosed a security breach wherein an unauthorized third-party broke into its network and potentially accessed data from one of its file servers.
"As the result of an internal investigation, it was determined that some data...
WIRTE Hacker Group Targets Government, Law, Financial Entities in Middle EastThe Hacker News
Government, diplomatic entities, military organizations, law firms, and financial institutions primarily located in the Middle East have been targeted as part of a stealthy malware campaign as early as 2019 by making use of malicious Microsoft Excel and Word documents.
Russian...
4 Android Banking Trojan Campaigns Targeted Over 300,000 Devices in 2021The Hacker News
Four different Android banking trojans were spread via the official Google Play Store between August and November 2021, resulting in more than 300,000 infections through various dropper apps that posed as seemingly harmless utility apps to take full control of...
New Chinotto Spyware Targets North Korean Defectors, Human Rights ActivistsThe Hacker News
North Korean defectors, journalists who cover North Korea-related news, and entities in South Korea are being zeroed in on by a nation-state-sponsored advanced persistent threat (APT) as part of a new wave of highly-targeted surveillance attacks.
Russian cybersecurity firm Kaspersky attributed...
CleanMyMac X: Performance and Security Software for MacbookThe Hacker News
We use Internet-enabled devices in every aspect of our lives today—to find information, shop, bank, do homework, play games, and keep in touch with friends and family. As a result, our devices contain much personal information about us.
Also, any great...
Hackers Using Compromised Google Cloud Accounts to Mine CryptocurrencyThe Hacker News
Threat actors are exploiting improperly-secured Google Cloud Platform (GCP) instances to download cryptocurrency mining software to the compromised systems as well as abusing its infrastructure to install ransomware, stage phishing campaigns, and even generate traffic to YouTube videos for view...







