Information Security (Page 57)

Cybersecurity specialists report the detection of at least six high-risk vulnerabilities and no known updates in the latest firmware version for Netgear Nighthawk R6700v3 routers. These devices are widely usedRead More →

Determining the location of a device is one of the most complex hacking tasks, although there are several tools that can incredibly simplify this process, reducing everything to a matterRead More →

CrowdStrike researchers report the detection of a hacking group operating from China and that has managed to infiltrate an academic institution by exploiting one of the flaws found in theRead More →

Cybersecurity specialists report the detection of various malicious campaigns based on the abuse of a component in Microsoft Build Engine (MSBuild) in order to execute a Cobalt Strike payload onRead More →

This week, the Apache Software Foundation issued a new set of patches to address remote code execution (RCE) flaws in Log4j, which could be exploited by threat actors to compromiseRead More →

Many may not know it, but in addition to having access to the apps available in the Google Play Store, users of Samsung devices can download and install the applicationsRead More →

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →

Cybersecurity experts predict that AvosLocker ransomware infections will increase considerably on these holidays. While this is a newly emerging ransomware variant, it has already been detected in multiple incidents, wreakingRead More →

Internet entrepreneur Justin Kan had recently launched his own non-fungible token (NFT) platform, joining a growing but controversial trend. Although Kan’s obvious goal was to make a profit, shortly afterRead More →