It has been reported that Popular open-source blogging platform with more than 2 million installs confirms it has been hacked. Although most…
Browsing: Malware and Vulnerabilities
Kubernetes is fast becoming a cornerstone technology for organisational agility, development speed, and business growth. While it was quickly adopted…
In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to…
The research team at Cybereason are investigating a new type of Android malware called EventBot, according to their blog. This…
With more remote workers, CIOs now have a range of new challenges and higher levels of uncertainty than before, so…
A OnePlus 7 security flaw could have exposed users’ fingerprints to hackers, according to Trusted Reviews. Although the vulnerability has now been…
A new variant of Russian malware tricks mobile users into encrypting their files, then impersonates the FBI to force ransom payments, accusing the…
Two companies that provide Usenet services have disclosed security breaches today. The two companies, UseNeXT and Usenet.nl, blamed the breaches…
Software containers have become more popular in recent years as many organizations have discovered the benefits of containerization. Kubernetes is…
A new ransomware has been circulating that spoofs the FBI to lend an air of legitimacy to the ransom demand,…