Microsoft fixed 121 security vulnerabilities in Windows
Once again, a zero-day vulnerability was fixed in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Like…
All News about Cybersecurity
Once again, a zero-day vulnerability was fixed in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Like…
There are as many as 3,200 mobile apps that expose developers’ Twitter account login credentials to the public: cyber crime…
The Lockbit ransomware group, one of the most prolific in the second quarter of this year, is exploiting new exploit…
In recent weeks, the NCSC (National Cyber Security Center) has seen an huge increase in reports of suspicious entries in…
Twitter has lost a large amount of data from its user accounts-the cause is allegedly due to the exploitation of…
Google provides several updates for Android: the cumulative package of updates that fixes 29 vulnerabilities identified in the various software…
A criminal phone phishing fraud is spreading on TikTok with all the virality of a prank: an automated answering machine…
A new criminal operation called 0mega has appeared: it uses ransomware with the double extortion technique and has a website…
The attack on Microsoft Teams is conducted with social engineering techniques to spread trojans on a platform with over 250…
Three vulnerabilities plague Samba, including one critical and one high severity vulnerability. Specifically, remote attackers can exploit them to execute…
The intentions of the Biden Administration to strengthen the US cyber security, following the SolarWinds, Microsoft and Colonial Pipeline cases,…
A new variant of the banking trojan BRATA has been identified and, thanks to increasingly advanced features, it is able…
A new variant of the njRAT trojan is targeting many users with a malspam campaign aimed at stealing banking login…
Private equity firm Symphony Technology Group (STG) has announced the new name of the company merged from McAfee Enterprise and…
Multinational impact on more than 500,000 extremely vulnerable people, putting aid programmes for families in war zones at risk. The…
Cisco Talos has confirmed in the past few days that malicious users are using remote access trojans (RATs) of the…
In this section you will find the list of ebooks on cybersecurity that are very recent. Books can be downloaded…
Cybersecurity is nowadays also one of the major challenges in the modern world. Probably one of the most difficult topics.…
The basic principle of Zero Trust is to regulate and authenticate privileged access to data and systems. Zero Trust encourages…
Windows, Linux and macOS users are in the crosshairs of SysJoker: the cross-platform malware has been active since the second…
Detecting existing security gaps in corporate networks quickly and reliably has become impossible manually due to vast volumes of data.…
The Lockheed Martin’s kill chain model as a threat assessment and prevention tool is no longer adaptable to the new…
This book is for anyone who is looking to learn how Cybersecurity can be implemented in your company. The Book…
EnemyBot is ready to launch attacks against routers, Internet of Things (IoT) devices, and a wide range of server architectures…
Despite threats from hacktivists, NestlĂ© remains active in Russia and Anonymous strikes again stealing 10GB of its customers’ material. In…