
CVE-2025-29635: Mirai finds its target in abandoned D-Link routers
More than a year ago security researchers published a failure in certain D-Link routers that has now started to be actively exploited by a Mirai-based botnet. The defect, identifi…
News on technological advances, startups and new trends

More than a year ago security researchers published a failure in certain D-Link routers that has now started to be actively exploited by a Mirai-based botnet. The defect, identifi…

In late 2025 and early 2025 cyber security researchers have identified a destructive malware so far undocumented that was used in a series of attacks directed against the energy a…

Microsoft has confirmed that a failure in the Universal Print sharing system - the cloud solution that replaces local printing servers and allows to manage printers from Microsoft…

Recently, the finding of a malicious software of mass data erasing that had not been publicly documented so far and which, according to researchers, was used in targeted attacks a…

The devices that "move" traditional serial equipment with IP networks - the serious converters - to- IP - are often invisible until something fails. They are simple and effective …

The US Agency for Infrastructure and Cybersecurity. US (CISA) has recently added eight vulnerabilities to its catalogue of Known Exploited Vulnerabilities (KEV), a clear sign that…

Last Saturday the crypt community woke up with news that once again put on the table a recurring problem: KelpDAO's wallets were emptied in an operation that, according to the fir…

A recent research report has uncovered a campaign that sought to empty cryptomoneda portfolios through fraudulent applications hosted in the Apple App Store. Security researchers …

The recent findings of Check Point Research put on the table a disturbing reality: a net based on the SystemBC proxy with more than 1,570 active machines has been identified as pa…