News
A short history of telephone hacking: from phreaking to mobile malware
We may think that the alteration of telephone systems has appeared with smart mobile devices because we often hear that…
Stay informed with the latest news, threat intelligence, and industry updates.
We are living uncertain times and experiencing a crisis we couldn’t even picture a couple of months ago. The COVID-19 pandemic pulled the rug under our feet and surfaced a…
florina
Author
News
We may think that the alteration of telephone systems has appeared with smart mobile devices because we often hear that…
News
In this article, we will talk about buffer overflow, which is one of the most popular vulnerabilities known to be…
News
Nearly 1500 high school and university students tested and developed their cyber security knowledge In 2020, (ISC)², one of the…
News
Summary Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. The…
News
In July 2021, the 1 CF Witting Hospital in Bucharest was a victim of a ransomware attack that heavily targeted…
News
The digitalization is no longer a buzzword, it started to spread faster than expected leaving lots of open doors for…