A new Android malware named ‘Hook’ is being sold by cybercriminals, boasting it can remotely take over mobile devices in real-time using VNC (virtual network computing)....
Suspected Chinese hackers exploited a recently disclosed FortiOS SSL-VPN vulnerability as a zero-day in December, targeting a European government and an African MSP with a new...
Los Angeles Unified School District (LAUSD), the second-largest school district in the United States, says the Vice Society ransomware gang has stolen files containing contractors’ personal...
The National Institute of Standards and Technology wants to expand the cybersecurity guidance’s scope and foster more international collaboration, among other proposed changes. The National Institute...
A report from DOD’s Office of Inspector General said that a lack of secure funding for the system places mission-critical activities “at risk of termination due...
A security audit of the source code for Git has revealed several vulnerabilities, including two critical overflow bugs. The audit, sponsored by the Open Source Technology Improvement...
Vulnerabilities in four Google Cloud Platform (GCP) projects have earned a pair of security researchers more than $22,000 in bug bounties. The most lucrative project for...
Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google search results. At least one prominent...
Git has patched two critical severity security vulnerabilities that could allow attackers to execute arbitrary code after successfully exploiting heap-based buffer overflow weaknesses. A third Windows-specific...
In today’s digital landscape, it is essential to implement proactive measures to ensure the security of your organization’s products. But even with good practices in place,...