The good old adage “never open attachments and documents from untrustworthy sources” is always relevant…
New and unknown worm targets Linux systems
January 11, 2024
In the last few days several systems Linux scattered all over the world have had…
A feature of Apple devices that is widely used due to its immediacy is AirDrop….
Applications that allow you to generate and manage OTP codes can be used to support…
Ransomware groups threaten to send SWAT to attack victims
January 8, 2024
The attacks of ransomware to medical institutes, especially on American soil, are now occurring on…
Can malware first detected in 2007 still be active and dangerous? Considering Bandookthe answer to…
According to research carried out by experts at CloudSEKsome cybercriminals are stealing account X for…
Orbit Chain Attack: $86 Million in Cryptocurrencies Stolen
January 4, 2024
On the evening of December 31, a hacker managed to sneak into the platform Orbit…
Can a ransomware “kill”? If literally this seems absurd, the effects related to this type…
Google's Mandiant: cybersecurity company's X account hacked
January 4, 2024
The cybersecurity company owned by Googleknown as Mandiantspent several hours trying to regain control of…