Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and...
Mois : janvier 2024
Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy...
CISA warns that a critical authentication bypass vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) and MobileIron Core...
Microsoft plans to provide Windows 11 users with almost instant access to photos and screenshots they’ve taken on...
Kansas State University (K-State) announced it is managing a cybersecurity incident that has disrupted certain network systems,...
CERTFR-2024-ACT-004 : Multiples vulnérabilités dans les implémentations d’UEFI (18 janvier 2024)

1 min read
Exécution de code arbitraire à distance Déni de service à distance Contournement de la politique de sécurité...
Appliances giant Haier reportedly issued a takedown notice to a software developer for creating Home Assistant integration...
Google says the ColdRiver Russian-backed hacking group is pushing previously unknown backdoor malware using payloads masquerading as a...
Learn how threat actors utilize credentials to break into privileged IT infrastructure to create data breaches and...
The United States government has recommended that Conor Brian Fitzpatrick, the creator and lead administrator of the...