It would be comforting if the only cyber-risks organizations had to worry about were the ones that smacked up against their firewall and endpoint security solutions....
The ethical hacking community saw a big boost this month, with the news that the US Supreme Court has tightened up the definition of unauthorized access. Previously,...
In reality, we have almost no power over our data and who uses it for what, according to the study. Users should not ultimately be the ones...
A universal cross-site scripting (uXSS) vulnerability in Microsoft Edge’s translation function left users open to attack, regardless of which website they visited, security researchers have claimed. Netting a...
The REvil ransomware operation have added a Linux encryptor to their arsenal that’s designed to target and encrypt Vmware ESXi virtual machines. BleepingComputer reports that security researcher MalwareHunterTeam...
Mira LaCous, Chief Technology Officer (CTO) of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security. Security: What...
Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. The survey of...
Microsoft has once again been successfully hit by a dependency hijacking attack. Previously, as first reported by BleepingComputer, a researcher had ethically hacked over 35 major tech...
The National Institute of Standards and Technology has defined “critical software” in accordance with an executive order to institute procurement standards federal agencies must follow. Some...
The Many Hats Club (TMHC), the infosec non-profit that produces popular podcasts and conferences alongside a Discord community, is to disband as of today (June 29). Announced...