New way to steal NFT via Discord used by cyber criminals
At the end of 2021, the Non-Fungible Token (NFT) projects Monkey Kingdom and Fractal were targeted by the same hacking variant, in which electronic fraud was made possible by theRead More →
At the end of 2021, the Non-Fungible Token (NFT) projects Monkey Kingdom and Fractal were targeted by the same hacking variant, in which electronic fraud was made possible by theRead More →
Cybersecurity specialists report the detection of a critical vulnerability in some VMware products, including Cloud Foundation, Fusion and Workstation. According to the report, the successful exploitation of these flaws wouldRead More →
Cybersecurity specialists report the detection of a new critical vulnerability that resides in the JNDI of the H2 database console, exploitable in an attack similar to Log4Shell. Although a levelRead More →
The French authority on information security determined to impose a €60 million penalty against Facebook and a €150 million penalty against Google after concluding that both companies hide from usersRead More →
In its latest security alert, the Federal Bureau of Investigation (FBI) warns U.S. citizens that those who have shared their phone numbers online could be affected by a Google VoiceRead More →
U.S. authorities announced additional charges against former chief security officer at Uber, in connection with his involvement in covering up a cyberattack and subsequent data breach against the ride-hailing service’sRead More →
Popcorn Time, which was once a giant of illegal downloads and streaming, has announced its definitive shut down due to the clear lack of interest that the platform currently gets.Read More →
In a statement, the Strategic Operations Unit of the Delhi Police, India, unveiled the dismantling of a hacking operation dedicated to resolving online exams, which also led to the issuanceRead More →
A team of cybersecurity specialists published their findings on a new approach based on the analysis of the irradiation of electromagnetic fields in Internet of Things (IoT) devices, which wouldRead More →
Information security specialists reported the finding of a critical vulnerability affecting VMware Workstation and VMware Fusion. According to the report, successful exploitation of these flaws would allow running arbitrary codeRead More →