Naked online: cyberthreats facing users of adult websites and applications
Pornography has always been part of human culture, and this continues in…
Cryptominers are taking ransomware’s place
Knowing how important and potentially devastating cybersecurity incidents and trends can be,…
Recently leaked malware source code isn’t Carbanak
Previous statements claimed that it was Carbanak source code that was leaked…
Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…
Top 7 Biggest data breaches of the 21st century
AdobeDate: October 2013.Leaked: 153 million user records.Details: As reported in early October…
Millions servers affected by Exim software
Millions of Internet-connected machines running the open source Exim mail server may…
HTTPS traffic intercepting by Kazakhstan government
Kazakh government first wanted to intercept all HTTPS traffic way back in…
WordPress developers forcibly update a vulnerable plugin
Рекомендуем почитать: Xakep #280. Джейл-2022 Содержание выпуска Подписка на «Хакер»-60% На этой…