Silent AirTags with no speakers are being used for stalking
A couple of years ago Apple launched the AirTag, a gadget that users could link to their mobile devices in order to prevent theft or loss; when someone can’t findRead More →
A couple of years ago Apple launched the AirTag, a gadget that users could link to their mobile devices in order to prevent theft or loss; when someone can’t findRead More →
In a recent report, the Federal Bureau of Investigation (FBI) Director Christopher Wray attributes responsibility for the largest cyberattack campaigns to the Chinese Communist Party, considering that for the currentRead More →
Timur Yunosov is a Russian cybersecurity researcher specializing in mobile security and payment system analysis. Working for Positive Technologies, Yunosov demonstrated how to exploit known vulnerabilities in Apple Pay toRead More →
In recent weeks, several cyber security researchers have reported massive flaws in the Internet infrastructure in North Korea, affecting the few users who have free access to the online worldRead More →
Cybersecurity specialists report the detection of four vulnerabilities in FortiWeb, the web application firewall (WAF) solution developed by the technology firm Fortinet. According to the report, the successful exploitation ofRead More →
A new research methodology has allowed specialists to track active vendors in several dark web platformsbased solely on how they write their ads and posts. Using stylometry, the experts wereRead More →
Through its Internet Crime Center (IC3), the Federal Bureau of Investigation (FBI) reports that cybercriminal groups are exploiting some errors in the verification mechanisms in a professional and job platformRead More →
Samba announced the release of some updates that aim to address various vulnerabilities whose successful exploitation would allow threat actors to lead to an arbitrary code execution scenario with highRead More →
In one unusual incident, screens in the Israeli Postal Company’s collection and distribution areas were synchronized to play a video showing only the phrase “DOWN WITH ISRAEL”, in what appearsRead More →
Cybersecurity specialists from Akamai reported the detection of a malicious campaign based on the abuse of Universal Plug and Play (UPnP) protocols in order to hack routers and use themRead More →