EnemyBot is a new danger
EnemyBot is ready to launch attacks against routers, Internet of Things (IoT) devices, and a wide range of server architectures…
All News about Cybersecurity
EnemyBot is ready to launch attacks against routers, Internet of Things (IoT) devices, and a wide range of server architectures…
Despite threats from hacktivists, Nestlé remains active in Russia and Anonymous strikes again stealing 10GB of its customers’ material. In…
The Escobar banking trojan steals victims’ Google Authenticator MFA codes to target banking institutions, bypassing the double factor authentication protecting…
The Snatch Group has claimed the exfiltration of more than 500 GB of confidential corporate data to McDonald’s, one of…
A new threat is targeting large companies: malware called fileless does not infect files but resides in the RAM of…
The attack on Microsoft Teams is conducted with social engineering techniques to spread trojans on a platform with over 250…
BlackCat claims the early February attack on Swissport, a Swiss company operating in the air transport sector. On February 3,…
Chrome has a high-severity vulnerability that has already been exploited by attackers. You need to update Google’s browser right away…
The US communications provider iBasis has fallen victim to a ransomware attack. A cyberattack on the US company iBasis may…
A new Pegasus case broke out in Israel after newspapers reported another massive cyber espionage operation against politicians and journalists.…
Security Startups will be the most innovative and interesting companies in the next years. Although cybersecurity can only be optimized…
Three vulnerabilities plague Samba, including one critical and one high severity vulnerability. Specifically, remote attackers can exploit them to execute…
The intentions of the Biden Administration to strengthen the US cyber security, following the SolarWinds, Microsoft and Colonial Pipeline cases,…
A new variant of the banking trojan BRATA has been identified and, thanks to increasingly advanced features, it is able…
A new variant of the njRAT trojan is targeting many users with a malspam campaign aimed at stealing banking login…
Private equity firm Symphony Technology Group (STG) has announced the new name of the company merged from McAfee Enterprise and…
Multinational impact on more than 500,000 extremely vulnerable people, putting aid programmes for families in war zones at risk. The…
Cisco Talos has confirmed in the past few days that malicious users are using remote access trojans (RATs) of the…
In this section you will find the list of ebooks on cybersecurity that are very recent. Books can be downloaded…
Cybersecurity is nowadays also one of the major challenges in the modern world. Probably one of the most difficult topics.…
The basic principle of Zero Trust is to regulate and authenticate privileged access to data and systems. Zero Trust encourages…
Windows, Linux and macOS users are in the crosshairs of SysJoker: the cross-platform malware has been active since the second…
Detecting existing security gaps in corporate networks quickly and reliably has become impossible manually due to vast volumes of data.…
The Lockheed Martin’s kill chain model as a threat assessment and prevention tool is no longer adaptable to the new…
This book is for anyone who is looking to learn how Cybersecurity can be implemented in your company. The Book…