pictureThe 17 biggest data breaches of the 21st century
In recent years, 17 serious data breaches were published. The data breach constitutes a huge loss of information and this has been a trend in our recent memory.


pictureThe biggest hack in the cryptocurrency history! $534 Million stolen
This time Coincheck, Japanese cryptocurrency exchange has been hacked and lost $534 million in NEM tokens.


pictureGDPR privacy tool provided by Facebook and Microsoft
In few months, GDPR is introduced into force, and companies racing against time to comply with the new rules. A GDPR tool was provided by Facebook and Microsoft.


pictureVirtualBox patches ten discovered vulnerabilities
Oracle launches released patches for ten vulnerabilities in VirtualBox which allow attackers to break out of guest operating systems and attack the host operating system that VirtualBox runs on.


picturelibcurl vulnerable since your inception
libcurl is a command-line transfer library that supports DICT, FILE, FTP, FTPS, Gopher, HTTP, HTTPS, IMAP and other. It is used to transfer data via URLs.  Are you prepared? It is vulnerable since the first commit we recorded and it was fixed in 7.58.0 version.


pictureSurvey – Preparations for the new Data Protection Act
According to the new research from the Department for Digital, Culture, Media and Sport (DCMS), 80% of large businesses have heard of GDPR, and 27% have made changes to how they operate in response.


pictureCode Execution Flaw Impacts Skype, Signal, Slack and other apps
Electron vulnerability. Skype, Signal, Slack, GitHub Desktop, Twitch, WordPress.com and other desktop apps are vulnerable to remote code execution.


pictureBell Canada – Leaked 100.000 individuals records
Bell Canada has been compromised in a breach that reportedly affects up to 100.000 individuals. It was communicated to customers, that their names and personal emails were accessed in a malicious campaign.


Did you like what you read? Don’t miss any more posts by subscribing our newsletter now!



pictureMonero crypto miner leveraging Apache Struts vulnerability
Cryptocurrency miners have begun using two older and already patched vulnerabilities to compromise servers to mine the Monero digital currency.


pictureNew botnet approach infects cryptocurrency replacing wallet address
After gaining control of the coin-mining software, Satori bot replaces the victim wallet address with the malicious address. In this way, the computer mining currency through the address controlled by the attacker.


pictureCritical Flaw in All Blizzard Games
A Google security researcher has discovered a severe vulnerability in Blizzard games, played every month by half a billion users—World of Warcraft, Overwatch, Diablo III, Hearthstone and Starcraft II.


pictureSonic apps in the Google Play published by SEGA leak users’ data
Android apps such as Sonic Dash, Sonic the Hedgehog™ Classic, and Sonic Dash 2: Sonic Boom, that have been totally downloaded millions of times are compromising user’s date.


I want to support the blog

Deixe um comentário

O seu endereço de email não será publicado. Campos obrigatórios marcados com *