Cyber Security

Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger

Dec 07, 2023The Hacker NewsEncryption / Data Privacy Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal...

ProvenRun Secures €15M Series A to Accelerate its Growth

PRESS RELEASEParis, 6th December 2023 - ProvenRun, the cybersecurity software company, announces a successful €15 million fundraising round. This investment is led by Tikehau...

WordPress fixes POP chain exposing websites to RCE attacks

WordPress has released version 6.4.2 that addresses a remote code execution (RCE) vulnerability that could be chained with another flaw to allow attackers run...

Governments May Spy on You by Requesting Push Notifications from Apple and Google

Dec 07, 2023The Hacker NewsPrivacy / Data Security Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people...

Cybersixgill Announces Identity Intelligence Module for Threat Analysis

PRESS RELEASETel Aviv, Israel – December 6, 2023 - Cybersixgill, the global cyber threat intelligence data provider, announced today new features and capabilities that take security teams’ threat...

New 5Ghoul attack impacts 5G phones with Qualcomm, MediaTek chips

A new set of vulnerabilities in 5G modems by Qualcomm and MediaTek, collectively called "5Ghoul," impact 710 5G smartphone models from Google partners...

Building a Robust Threat Intelligence with Wazuh

Dec 07, 2023The Hacker NewsThreat Intelligence / Network Security Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures...

Latest articles