The vast majority of the most popular Windows-native PDF viewers were vulnerable to multiple attack techniques exploiting standard PDF features, a team of security researchers has discovered. Several...
INTERVIEW Ranking among the top 10 hackers on bug bounty platform YesWeHack’s all-time leaderboard, Raphaël Arrouas’ methodologies will be of interest to security researchers of all abilities. Arrouas,...
Opening a website with an embedded YouTube video potentially allowed miscreants to access a user’s viewing history, favorites, and playlists. The security bug – which earned...
WhiteHat Security, a San Jose, Calif.-based provider of application security, announced the launch of AppSec Stats Flash, a monthly podcast and statistics report aimed at providing a...
New research from Digital Shadows shows how cybercriminals are increasingly setting their sights on asset and wealth management companies (AWM). The assets under management by AWM...
Code42 pulled some anonymized, aggregated data from Incydr, a SaaS data risk detection and response solution, showing how users move and exfiltrate data and files. The most exposed type?...
Kroll, a division of Duff & Phelps, provider of risk mitigation, investigations, compliance, cyber resilience, security and incident response solutions, announced the hiring of three seasoned cyber...
In recent years, the Internet and social media have devolved into a virtual minefield for corporate executives. The pandemic and sociopolitical unrest of 2020 further accelerated...
Since the emergence of COVID-19, fraudsters have launched fraud campaigns against critical services that serve as lifelines to the public. According to the Federal Trade Commission...
Posts highlighting the former and present administrations’ moves spanned online platforms Wednesday. Outgoing Trump-appointed officials turned to social media on Wednesday to reflect on their tenures...