At least 32 Indian organisations have been attacked by hackers who exploited vulnerabilities in unpatched Microsoft business email servers, a new report warned on Monday, adding...
The Global Legal Entity Identifier Foundation (GLEIF) has announced a new collaboration with Certification Authorities (CAs) and Trust Service Providers (TSPs), to drive the use of...
Google issues a new warning about Spectre attacks using JavaScript to leak data from one site to another. Google has released a proof of concept (PoC)...
A new report, developed by Aite Group, and underwritten by GIACT, uncovers the striking pervasiveness of identity theft perpetrated against U.S. consumers and tracks shifts in banking behaviors...
The Telecommunications Industry Association published a new white paper on SCS 9001, the first process-based supply chain security standard for the information communications technology (ICT) industry. With sophisticated supply...
Critical vulnerabilities in LocalStack, a popular framework for building cloud applications, can be chained to remotely take over locally-run LocalStack instances, security researchers claim. Researchers from...
The word “hacking” tends to have a negative connotation, but in actuality, hacking can also be used for good: such as “ethical hacking.” Ethical hacking is about...
Microsoft has addressed a known issue causing memory or disk space errors when opening some documents using Microsoft Word, Microsoft Excel, or other Microsoft Office apps....
A new online service allows security researchers to search for exposed shortened URLs, known for their risks to security and privacy. Shortened URLs are comparatively easy to brute-force,...
While cyberattacks targeting large corporations or government agencies tend to make splashy headlines, the truth is that many attackers are shifting their priorities to focus on...