Viruses, trojans, software vulnerabilities, security issues

Fraudsters began to hijack accounts using corrupted Microsoft Word files

Cybercriminals have come up with a new way to carry out phishing attacks by bypassing the security systems of potential…

3 months ago

The State Duma adopted a law on millions of fines for personal data leaks

The State Duma immediately adopted in the second and third readings a law providing for fines for leakage of personal…

3 months ago

Hackers have found a way to disable Avast antivirus using its own driver

Cybersecurity researchers at Trellix have discovered that hackers have found a new way to disable antivirus programs on target systems…

3 months ago

D-Link offered to eliminate the vulnerability of routers by purchasing a new device

D-Link has announced that several of its routers have a remote code execution vulnerability. The company is not going to…

3 months ago

AI helped Google identify 26 open source software vulnerabilities, including a twenty-year-old

Google has used artificial intelligence to identify 26 new vulnerabilities in open source projects, including a bug in OpenSSL that…

3 months ago

GrayKey tool learns to “partially” jailbreak iPhone 16 — but can’t handle beta versions of iOS 18

Documents have leaked online revealing the capabilities of the hacking tool GrayKey, used by US law enforcement agencies, capable of…

3 months ago

Apple urgently closed two zero-day vulnerabilities in macOS, iOS and iPadOS

Apple has released emergency security updates for macOS, iOS and iPadOS, eliminating two critical zero-day vulnerabilities that were actively exploited…

3 months ago

Windows has a new recovery mode and other features that will prevent the CrowdStrike crash from happening again

After the devastating CrowdStrike outage in July this year, Microsoft promised to improve the situation, although it insisted that the…

3 months ago

Hackers attacked projects on GitHub in an attempt to frame a cybersecurity expert

Executives at artificial intelligence and machine learning startup Exo Labs reported that an unknown person tried to change the code…

3 months ago

Chinese hackers accused of large-scale attack on US telecommunications networks

T-Mobile's network was among the systems hacked as part of a large-scale Chinese cyber espionage operation. The operation affected many…

3 months ago