20 GB of confidential Intel documents and specifications leaked online
The leaked database contains Intel files that are subject to a non-disclosure agreement.
The leaked database contains Intel files that are subject to a non-disclosure agreement.
Manipulating email header fields allows for various types of attacks to deceive the addressee.
Oilrig members have added a new DNSExfiltrator utility to their hacking arsenal.
The list was published on a Russian-speaking hacker forum frequented by different ransomware operators.
Stolen information may include Xerox support records and source code for the firmware of various LG products.
According to preliminary estimates of experts, in 2020 there will be as many 0Day vulnerabilities as in 2019.
The expert also intends to disclose information about at least three alleged zero-day vulnerabilities.
SHA-1 Windows content will be retired from the Microsoft Download Center on August 3, 2020
The exploitation of vulnerabilities allows to overwrite data, execute malicious code or commands and cause a DoS condition.
Most victims of the malware threat are located in Western Europe and North America.
Showing elements 3521 - 3530