Apple under investigation in Germany for monopoly
The focus of this investigation will be the App Store and whether Apple has created an ecosystem that revolves around…
The focus of this investigation will be the App Store and whether Apple has created an ecosystem that revolves around…
Tor has released Tor Browser 10.0.18, addressing multiple flaws, including a vulnerability that could be exploited to track users by…
Last year, a critical stack-based Buffer Overflow vulnerability, tracked as CVE-2020-5135, was discovered affecting over 800,000 SonicWall VPNs. When exploited,…
Cybersecurity company SonicWall was targeted with a coordinated attack on its internal systems, threat actors exploited zero-day vulnerabilities in their…
Russian, Chinese and Iranian hackers are trying to eavesdrop on people and groups involved in the US presidential election in…
Russia has carried out what it called “exercises” to ensure the security of its Internet infrastructure, as part of measures…
The European Commission is planning to appeal the decision of the European General Court in favor of Apple, while the…
A vulnerability was found in QEMU 5.0.0 (Virtualization Software). It has been rated as problematic. Affected by this issue is…
Social media companies are removing videos and images that according to a new report from Human Rights Watch could be…
The infamous Russian hacker group Fancy Bear also known as APT28 and Strontium are targeting government agencies of NATO member…