GIGABYTE has released firmware updates to fix security vulnerabilities in over 270 motherboards that could be exploited to install malware....
Google has published JavaScript proof-of-concept (PoC) code to demonstrate the practicality of using Spectre exploits targeting web browsers to access information from a browser’s memory. According...
The operators of Lemon_Duck, a cryptomining botnet that targets enterprise networks, are now using Microsoft Exchange ProxyLogon exploits in attacks against unpatched servers. The malware is...
Researchers have now disclosed more information on how they were able to breach multiple websites of the Indian government. Last month, researchers from the Sakura Samurai...
A new botnet is hunting down and transforming infected routers, DVRs, and UPnP network devices into honeypots that help it find other targets to infect. The...
Washington DC congresswoman Suzan DelBene has introduced legislation that would create a national data privacy law in the US. With no federal law currently in place...
The marketplace was built as part of a recent Defense Department initiative aimed at advancing microelectronics technologies. IBM announced the establishment of a new marketplace inside...
The legislation would require companies to write their privacy policies in plain English. The House will soon consider legislation that would create the federal government’s first...
Google has teamed up with the Linux community on a new project that aims to make open source software more secure through easy code signing and...
Today, OVH founder and chairman Octave Klaba has provided a plausible explanation for the fire that had burned down OVH data centers in Strasbourg, France. OVH is the...
An official version of the popular 7-zip archiving program has been released for Linux for the first time. Linux already had support for the 7-zip archive...
Recent Comments