technology

Many users are unaware that, by default, Kali Linux includes a decryption tool for passwords that protect compressed files, although they would be even more surprised to know that itRead More →

Cybersecurity specialists report the detection of PACMAN, a new hardware vector attack targeting a function of Apple M1 chips that would allow threat actors to execute arbitrary code on affectedRead More →

Experts from Trellix Threat Labs have shared research on multiple vulnerabilities in an industrial control system (ICS) used to grant physical access to protected facilities, and integrated into building automationRead More →

A worrying number of cybercriminal campaigns occur with no indication of those responsible for these online crimes, especially those with financial motivations. However, in some cases, threat actors leave enoughRead More →

A joint operation by Europol, Eurojust, the U.S. Federal Bureau of Investigation (FBI), Slovakia’s National Crime Agency, and the Slovak Police, led to the arrest of an individual considered oneRead More →

As part of a settlement from a class-action lawsuit, Google agreed to pay Google Photos users in Illinois, U.S., a total of $100 million after it was determined that theRead More →

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a security alert regarding a set of vulnerabilities that would allow malicious hackers to take control of Illumia genetic analysis devices.Read More →

Threat actors could exploit a critical zero-day vulnerability in Windows Search to run remotely hosted malware just by automatically opening a search window with a Word document. According to theRead More →