Information Security (Page 59)

KELA cybersecurity researchers, dedicated to monitoring illegal activity on the dark web and on the conventional Internet, report the detection of a new black market platform that has recently appearedRead More →

Cybersecurity specialists report the detection of a flaw that would allow threat actors to abuse a set of load optimization features in Google Chrome to evade the Site Isolation feature.Read More →

The cybersecurity unit of the Federal Bureau of Investigation (FBI) has launched an alert to notify organizations using ManageEngine Desktop Central, developed by Zoho, that a hacking group is exploitingRead More →

According to a report by the Daily Mail, a Russian hacking group infected the systems of some police departments in the United Kingdom with a ransomware variant and leaked someRead More →

Exploiting vulnerabilities detected in previous versions of Log4j remains a severe issue, so the cybersecurity community is still looking for the best ways to prevent a cyberattack. However, some usersRead More →

Kali Linux is one of the best and most popular ethical hacking and security auditing tools, as it allows cybersecurity experts to run all the hardware of a system andRead More →

Cybersecurity specialists report the detection of a critical vulnerability in All In One SEO, one of the most popular plugins in WordPress, installed on more than 3 million websites operatedRead More →

The U.S. Department of Justice (DOJ) determined that the rights to all content related to the sex trafficking case on the adult platforms GirlsDoPorn and GirlsDoToys must be granted toRead More →

German authorities announced the prison sentence against eight individuals accused of the operation and development of CyberBunker, a popular bulletproof hosting service among the cybercriminal community. In court documents, itRead More →