Please turn on your JavaScript for this page to function normally.
EncroChat
EncroChat dismantling lead to 6500 arrests, EUR 900 million seized

Worldwide, 6558 arrests follow the dismantling of EncroChat, a tool favored by organized crime groups (OCGs). 197 of those arrested were high-value targets. This result is …

risk
Organizations brace for cyber attacks despite improved preparedness

Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global organizations, …

power
Why juice jacking is overhyped

Travelers should avoid public USB charging stations at airports, hotels, and other venues, as they may harbor malicious software. Designed for both data and power …

router
Researchers discover sensitive corporate data on decommissioned routers

Looking at configuration data, 56% of decommissioned routers disposed of and sold on the secondary market contained sensitive corporate data, according to ESET. Of the …

tools
Security beyond software: The open source hardware security evolution

Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But …

QNAP
Vulnerabilities impacting multiple QNAP operating systems (CVE-2022-27597, CVE-2022-27598)

Two vulnerabilities affecting various QNAP operating systems (CVE-2022-27597 and CVE-2022-27598) have been uncovered by Sternum. These vulnerabilities enable authenticated …

BEC scams
BEC scammers are after physical goods, the FBI warns

BEC attacks are usually aimed at stealing money or valuable information, but the FBI warns that BEC scammers are increasingly trying to get their hands on physical goods such …

Intel vPro
Intel vPro platform unveils advanced security measures

Intel has launched the latest Intel vPro platform, which is powered by 13th Gen Intel Core processors and offers a broad range of features, including powerful security …

chip
How to combat hardware Trojans by detecting microchip manipulations

Not only do security vulnerabilities lurk within software, but they can also be embedded directly into hardware, leaving technical applications open to widespread attack. For …

Samsung Exynos
Samsung, Vivo, Google phones open to remote compromise without user interaction

Several vulnerabilities in Samsung’s Exynos chipsets may allow attackers to remotely compromise specific Samsung Galaxy, Vivo and Google Pixel mobile phones with no user …

RUB drone
Vulnerability in DJI drones may reveal pilot’s location

Serious security vulnerabilities have been identified in multiple DJI drones. These weaknesses had the potential to allow users to modify crucial drone identification details …

router
Business-grade routers compromised in low-key attack campaign

An unknown threat actor has discreetly compromised business-grade DrayTek routers in Europe, Latin and North America, equipping them with a remote access trojan (dubbed …

Don't miss

Cybersecurity news