The hacker group used the Cacti “Network Weathermap” plug-in for a five-year-old vulnerability to install Monero miners...
The Apache HTTP Server Project is a collaborative software development effort aimed at creating a robust, commercial-grade,...
Recently, GitLab released a global developer report, which surveyed a total of 5296 software professionals from around the world....
Internet engineers recently passed a security framework that will make encrypted connections on the network faster and...
In 2016, Opera co-founder Jon von Tetzchner launched Vivaldi, the desktop browser app. The desktop browser Vivaldi has won...
According to foreign media Quartz reports, in 2010, Apple co-founder Steve Jobs had tried to warn CEO...
Recent reports indicate that attacks such as ransomware can bypass traditional security solutions because these organizations often overlook the importance of patching, updating,...
Recently, Palo Alto Networks security experts discovered a new Android Trojan called TeleRAT that uses Telegram’s Bot API to communicate with...
Israel’s Justice Ministry said on the 22nd that it has begun investigating the accident of the leakage of...
After the 50 million user data leakage incident on Facebook was exposed, the massive #deletefacebook campaign was...
According to Daily Beast reports, Guccifer 2.0, a hacker group is known for its attacks on DNC...
On March 28, Drupal officially issued an important update. A serious security vulnerability involving Drupal 7.x, 8.3.x,...
On March 22, the security researcher at Dutch fintech firm VI Company published the report about Coinbase’s...
Recently, the Linux kernel was exposed to a memory corruption vulnerability (CVE-2018-8822). The vulnerability is due to incorrect...
According to the analysis report published by Web security company WebRoot on Wednesday, the latest version of...