Please turn on your JavaScript for this page to function normally.
Fortnite

Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials
Researchers at Check Point today shared details of vulnerabilities that could have affected any player of the hugely popular online battle game, Fortnite. Vulnerability impact …

Fortnite is coming to Android, but malicious fake apps are already there
Android users eager to play the increasingly popular Fortnite survival game on their mobile devices are being targeted left and right with malicious apps masquerading as the …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility