Security

Banking Trojan Database Exposes Financial Details of Millions of Victims

Two unprotected MongoDB instances were accessible without password and indexed by search engines. The databases contained 2.2 million passwords belonging to about...

CamScanner Claims to Have Fallen Victim of Malicious Ad Network

The developer of CamScanner admits to having been tricked by a malicious ad network provider. The rogue SDK affected versions between 5.11.7...

Skidmap is a New Cryptomining Malware For Linux Systems

Skidmap is a modern example of the sophistication and power of Linux malware samples. It features high levels of obfuscation, loads kernel-mode...

Nemty Ransomware Evolving to Kill Processes and Services

Nemty can now kill processes and services and encrypt files that are underuse. Examples include virtual box systems and files, Thunderbird emails,...

The Whole Population of Ecuador Was Exposed Online

vpnMentor’s team of researchers have discovered yet another unprotected Elasticsearch server. The database that they’ve found contains 20.8 million records that belong...

T-Mobile Offers a Strong SIM Swapping Protection Feature that No One Knows About

T-Mobile is apparently offering a SIM swapping protection feature, but they’re not advertising it. This feature requires the physical presence of the...

iOS 13 Lock Screen Can Be Bypassed to Access Address Book Info

A researcher has discovered that he can access the address book on iOS 13 without providing a passcode. While this sounds a...

SIM Card Flaw Under Active Exploitation Affecting Over a Billion People

A previously undisclosed SIM card vulnerability is already under exploitation by surveillance firms. The attack is called “Simjacker” and involves the sending...

F-Secure’s Attack Landscape Report for H1 2019 Paints a Pretty Grim Picture

F-Secure’s Attack Landscape Report paints a dire picture of today's global cybersecurity state.  The number of attack events has gone three times up...

Metasploit Project Publishes Working Exploit for BlueKeep

Metasploit publishes a new BlueKeep exploit module that is working better than anything else we’ve had before. The team of researchers is...

Recent Articles

Brandon Hoffman, NetEnrich: AI Is No Replacement for People in Cybersec

NetEnrich is a Silicon Valley company that does its best to help other companies protect themselves from outside threats and more. For a few...

How to Protect Yourself From VPN Data Breaches

VPNs or Virtual Private Networks offer us one of the strongest forms of online security possible. The encrypted tunnel that your data is wrapped...

5 Best Kodi Repositories in 2020 – Your Gateway to Hundreds of High-Quality Kodi Addons!

Here's our overview of the best Kodi repositories in 2020. Official Kodi Repository TVAddons Repository BludhavenGrayson Repository Mhancoc7 Repository Marcelveldt Repository By using repositories, you...

Cryptocurrency Trading Platform ‘2gether’ Lost $1.4 Million to Hackers

Spanish crypto-investment platform ‘2gether’ lost a fourth of its assets in a hacking attack. The CEO stated that they do not have...

Google Released “Ads Transparency Spotlight” Extension for Chrome

A new extension for Chrome plans to lay down all information about ads that run on a webpage. Things like present entities...