News
Každý den používáte věci, které vymysleli Češi, aniž byste o tom měli tušení. Kostka cukru v ranní kávě? Český patent z roku 1843. Kontaktní čočky, které si právě nasazujete do očí? Za ty může Otto ...
Než se voda z čističky dostane do naší sklenice, tak se několikrát filtruje a následně se do ní přidává chlor. Ten má jednak dezinfekční funkci a měl by zabránit kontaminaci vody, která stojí v ...
A Microsoft SharePoint zero-day exploit has led to a breach of the US National Nuclear Security Administration. Microsoft says Chinese state-backed hackers exploited the vulnerability in on ...
This mutex ensures single-instance execution, preventing multiple ransomware processes from running simultaneously. Additionally, the group uses ChaCha20-Poly1305 encryption, a modern algorithm that ...
Microsoft has confirmed three Chinese-based threat groups have been actively exploiting CVE-2025-53770 and CVE-2025-53771, two critical and high-severity vulnerabilities in internet-facing SharePoint ...
Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed ...
Microsoft links SharePoint attacks to three China-based groups; flaws allow code execution and data theft on unpatched systems.
Ransomware continues to be a pervasive cyber-security threat, particularly in enterprise environments that leverage Active Directory (AD) for centralized management. This study focuses on analyzing ...
NTSB's preliminary report details a small plane crash in Weld County killing the pilot, describing the last moments from descent to impact.
From jerseys that stood the test of time to duds that teams couldn't ditch soon enough, here's the best and worst for every team.
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results