Hackers attack Wikipedia to display Nazi signs in several pages
The Holocaust is probably the darkest chapter in modern history, taking the lives of more than 6 million people killed with extreme cruelty by the Nazi regime. This is anRead More →
The Holocaust is probably the darkest chapter in modern history, taking the lives of more than 6 million people killed with extreme cruelty by the Nazi regime. This is anRead More →
Cybersecurity specialists report the detection of a cross-site scripting (XSS) vulnerability in SEOPress, a popular WordPress plugin for search engine optimization (SEO), allowing webmasters to manage SEO metadata, social mediaRead More →
Security issues in the GNU C library (gblic) can be disastrous for Linux users. An example of this is CVE-2021-33574, a vulnerability that would have allowed threat actors to causeRead More →
Cybersecurity specialists reported the discovery of a severe flaw in the design of some middlebox models, a term referring to computer network devices that transform, inspect, filter and manipulate trafficRead More →
After rebranding themselves as a new operation dubbed as El_Cometa, the SynAck ransomware group decided to publish the master keys for the decryption of systems infected by this malware variant.Read More →
Security teams at telecommunications firm T-Mobile are investigating a data breach after a hacker appeared claiming he has access to the records of some 100 million customers. The investigation beganRead More →
Phishing remains one of the most common and dangerous criminal practices for users in general, and every day new and dangerous tools emerge to deploy this attack variant. On thisRead More →
Telegram has become one of the best instant messaging tools, currently being the main counterpart of WhatsApp thanks to its advanced privacy and anonymity capabilities. Even today, there are manyRead More →
Cybersecurity specialists report the detection of a critical vulnerability in Cortex XSOAR, the detection and response platform executed on fully integrated endpoint, network and cloud data developed by Palo AltoRead More →
Cybersecurity specialists report the detection of three critical vulnerabilities in Node.js, the popular open-source, real-time, cross-platform execution environment based on the JavaScript programming language. The first of the reported flaws,Read More →