Security JPG files: why they can be very dangerous and how to avoid risksDecember 4, 2023At least until a few years ago, when we talked about viruses and malware the… Read more
Security The Turtle malware worries experts due to its spread and elusive capabilitiesDecember 4, 2023In recent weeks, the malware Turtle which, due to its characteristics elusiveis making security experts…
Security Deepfake: Elon Musk's image also exploited for scamsDecember 4, 2023Whether it is illicit advertising operations or actual cases of fraud, i deepfake are an…
Security Google CEO warns: beware of apps outside of Google PlayDecember 4, 2023Look for apps outside of Google Play is dangerous, as is well known among users…
Security Less phishing or spam and more fake websites: the new trends in cybercrimeDecember 4, 2023Threats on the Web are constantly evolving, and for that matter, the cybersecurity researcher Keegan…
Security Cactus Ransomware: Its advanced techniques scare expertsDecember 1, 2023And ransomwareknown by the name of Cactusis worrying researchers working in the context of cybersecurity….
Security Social engineering scam affects Booking.com usersDecember 1, 2023A new malicious campaign has targeted users of Booking.com making extensive use of social engineering…
Security Zoom: critical vulnerabilities resolved, hacker risk in meetings stoppedDecember 1, 2023Through an official communication the team of Zoom confirmed that he had solved one critical…
Security Trickbot malware: US court finds Russian hacker guiltyDecember 1, 2023The Russian hacker was found guilty by an American court in relation to the development…
Security FjordPhantom, Android malware exploits virtualization techniquesDecember 1, 2023Through the tireless work of security experts it was possible to identify and analyze FjordPhantomun…