Security researchers have identified several vulnerabilities in how apps open and handle URLs, leading to 1-click code execution actions that don’t require user input. It’s easy to think that a simple action like opening an URL in an application doesn’t pose much of a...
The Swedish authorities have decided to halt an investigation into a data breach supposedly perpetrated by the Russian military intelligence, GRU, over the course of a few months in 2017 and 2018. From December 2017 until May 2018, the Swedish Sports Confederation was...
The Biden administration this week has issued a statement blaming the Russian government for the SolarWinds supply chain attack, imposing costs on the rival nation for its actions. A lengthy press release from the White House issued April 15 points the finger at...
At G DATA we always are providing our customers with the confidence that our solutions always meet high standards to operate safely throughout their lifecycle worldwide. Our cyber security products has always produced many highlights like Anti-Ransomware, Beast,...
Users of the employment-oriented online service are being targeted with an assortment of phishing emails and scams in an attempt to hijack their LinkedIn accounts or promote fake LinkedIn email leads. According to Bitdefender Antispam Lab telemetry, ramifications of...