A researcher detailed how he chained a series of vulnerabilities to achieve remote code execution (RCE) on an Amazon Kindle e-reader. Researcher Yogev Bar-On, of Readlmode Labs, who...
In December 2020, the cybersecurity firm FireEye discovered one of the worst cyberattack in the U.S.’s history. While the full ramifications of this attack remain to be seen,...
After a data breach, much of that stolen personal and sometimes highly personally identifiable information (PII) is sold on markets residing within the dark web. But,...
With millions of people working from home at present, and likely into the future, the enterprise perimeter has all but dissolved. In the process, organizations are...
The past year has been a rollercoaster of history-defining events that we’ve collectively watched and experienced in a state of disbelief. While we’ve been focused on...
This past year was a turbulent one across all industries and sectors. From the opening days of the virus, to the shutdowns that followed and now...
Threat hunting company Group-IB published a report on a new scam scheme that they named “Classiscam.” The report reveals 40 or more groups currently running this scheme across Russia...
Official says a selection of the first contractors to be audited will be vetted by members of the new administration. The Department of Defense is figuring...
VPN providers should adhere to a minimum standard of ethics to deter cybercriminals from taking advantage of their privacy-enhancing software. That is the stance taken by industry group...
Carders, fraudsters, and other cybercriminals will be quick to migrate to other nefarious platforms if infamous darknet site the Joker’s Stash closes as promised next month,...