Sticky

Azure DevOps Serve is a comprehensive solution developed by Microsoft for versioning, report collection, and tracking for collaboration on software development projects. The product is available as a standalone application,Read More →

A new bill introduced in Florida’s Senate seeks to ban what lawmakers define as unauthorized digital trafficking of counterfeit lewd content, establishing tough measures against the practice known as revengeRead More →

The government of France announced the arrest of thirteen people accused of having hacked the account of a nurse to create more than 60,000 COVID-19 passes. Although their names areRead More →

The U.S. Department of Justice (DOJ) reports that Israeli citizen Tal Prihar has been sentenced to eight years in prison for his participation in the administration of DeepDotWeb (DDW), aRead More →

Specialists report that the Internet infrastructure in North Korea is experiencing severe disruptions during the last weeks, possibly caused by a denial of service (DoS) attack. The latest incident tookRead More →

Although law enforcement in Russia, the United States and other countries believed that the recent arrest of some members of the cybercriminal group REvil would represent a severe blow toRead More →

Cybersecurity specialists mention that the developers of the Trickbot Trojan have added a new set of advanced features to prevent researchers from reverse-engineering this malware, protection based on the blockingRead More →

Cybersecurity specialists reported the detection of three vulnerabilities in PrinterLogic whose exploitation would allow threat actors to trace a remote code execution path on any connected endpoint. As you mayRead More →

In a security alert, Microsoft warned Office 365 customers about a phishing campaign in which threat actors seek to get affected users to grant OAuth permissions and eventually access theirRead More →

Cybersecurity specialists report the finding of CVE-2022-0185, a severe vulnerability in the Linux kernel that can be exploited to evade containers in Kubernetes, allowing threat actors to access resources onRead More →