Bitwarden announced the results of a global survey of enterprise security decision makers, conducted by 451 Research, which explores enterprise password management practices and intent. Overall, the survey...
Some attacks on smartphones require physical access to the device and interactions with the touchscreen. So your phone is more or less safe as long as...
Metasploit 6.2.0 has been released with 138 new modules, 148 new improvements/features, and 156 bug fixes since version 6.1.0 was released in August 2021. Metasploit is...
Microsoft says BlackCat ransomware affiliates are now attacking Microsoft Exchange servers using exploits targeting unpatched vulnerabilities. In at least one incident that Microsoft’s security experts observed,...
Deep Instinct released the third edition of its annual Voice of SecOps Report, focused on the increasing and unsustainable stress levels among 1,000 C-suite and senior...
The healthcare and personal information of up to 70,000 Kaiser Permanente patients in Washington state may have been exposed following unauthorized access to the US healthcare...
The French government has launched an invite-only bug bounty program for its newly launched identity authentication application, ‘France Identité’. Hosted by Paris-based ethical hacking platform YesWeHack, the program...
PyPI packages ‘keep,’ ‘pyanxdns,’ ‘api-res-py’ were found to be containing a backdoor due to the presence of malicious ‘request’ dependency within some versions. For example, while most versions of ‘keep’...
The Iranian Lycaeum APT hacking group uses a new .NET-based DNS backdoor to conduct attacks on companies in the energy and telecommunication sectors. Lyceum is a...
https://player.vimeo.com/video/716005187?h=b4510d5bee&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In this video for Help Net Security, Christian Lawaetz Halvorsen, CTO at Valuer, talks about what cybersecurity investors should be aware of in 2022. He discusses...