Threat hunting has been around for a while, but only recently it has become a sort of buzzword in cybersecurity circles. Besides security professionals, more
Read more
Threat hunting has been around for a while, but only recently it has become a sort of buzzword in cybersecurity circles. Besides security professionals, more
Read moreEarlier this week, Google had published a research blog about who are the people and regions most prone to cyber-attacks via email. The blog states
Read moreInstagram is a widely popular social media platform. This directly means that the app runs on a solid algorithm, the workings of which can’t be
Read moreEMSISOFT, Antivirus Firm revealed a data breach on one of their test systems. The company used the system to evaluate and benchmark possible solutions relating
Read moreSports stars, musicians, internet influencers. Wondering what they have in common apart from their lavish lifestyles? Well, they have had more than 100 million USD
Read moreResearchers have studied and analyzed the workings of the hacking group Domestic Kitten. Domestic Kitten also goes by the name APT-50, and has been accused
Read moreMicrosoft released a set of fixes affecting Windows TCP/IP implementation that include two Critical Remote Code Execution (RCE) vulnerabilities (CVE-2021-24074, CVE-2021-24094) and an important Denial
Read moreCD Projekt S.A. is a Polish video game developer, publisher, and distributor based in Warsaw, Poland. CD Projekt Red, the videogame-development company behind Cyberpunk 2077
Read moreA popular Barcode Scanner App with above 10 million downloads on the Google Play Store has been caught infecting Android devices with malware. The app
Read morePinellas County Sheriff Bob Gualtieri said that a hacker gained access into the water system of Oldsmar, Florida, on Friday and tried to increase the
Read moreRecently, Google has released a new version of Google Chrome browser for Windows, Mac and Linux, that contains only one bugfix for a zero-day vulnerability
Read more