News
-
Addresses of 270,000 Ledger crypto wallet users leaked to the network
Bleeping Computer reports that email addresses and physical addresses of 270,000 Ledger hardware wallet users have leaked into the network.…
Read More » -
Avast experts discovered 28 dangerous extensions for Google Chrome and Microsoft Edge
Experts from the antivirus software manufacturer Avast have discovered malware that was hidden in at least 28 dangerous third-party extensions…
Read More » -
Cellebrite says it can now hack the Signal messenger
Mobile hacking tool maker Cellebrite, an Israeli company, said its tool can now hack the Signal app, which is considered…
Read More » -
Hackers Influenced Valve’s Online Games Using Vulnerabilities in the Steam Platform
The Check Point team has discovered vulnerabilities in the Steam gaming platform from Valve. The root of the problem lay…
Read More » -
Hackers exploit vulnerability in Easy WP SMTP WordPress plugin to reset admin passwords
Last week, the popular Easy WP SMTP plugin for WordPress, installed more than 500,000 sites, was patched for a serious…
Read More » -
Attackers hide MageCart scripts even in CSS files
Over the years, hacker groups have come up with a variety of tricks to hide their web skimmer code from…
Read More » -
D-Link developers fixed serious bugs in their routers
In the summer of this year, Digital Defense specialists discovered quite serious bugs in a number of D-Link router models.…
Read More » -
DoppelPaymer ransomware attacked Foxconn Mexican division
Bleeping Computer reported that two weeks ago, on Thanksgiving Day, the DoppelPaymer ransomware attacked Foxconn Mexican division. Attackers demand from.…
Read More » -
VMware patches 0-day vulnerability discovered by NSA
At the end of November, VMware announced a 0-day vulnerability CVE-2020-4006 in its products, which discovered NSA specialists. Firstly, the…
Read More » -
GitHub says it takes years to fix vulnerabilities in some ecosystems
In a new GitHub report, representatives of the web service talked about the problems of fixing some vulnerabilities. Based on…
Read More »