A security researcher claims he bypassed the tracking protection features built into Apple’s Find My app and AirTag tracking devices with a custom-made AirTag clone. Amid mounting...
Researchers have disclosed critical vulnerabilities in Extensis Portfolio, including a zero-day flaw that’s yet to be patched. On February 17, White Oak Security researchers Michael Rand...
A security researcher has netted a $250,000 bug bounty for disclosing a vulnerability in Coinbase that could have allowed a user to ‘sell’ currency they did...
A new version of the CryptBot info stealer was seen in distribution via multiple websites that offer free downloads of cracks for games and pro-grade software....
Meyer Corporation, the largest cookware distributor in the U.S., and the second-largest globally, has informed U.S. Attorney General offices of a data breach affecting thousands of...
In this interview with Help Net Security, Lee Garf, GM of Financial Markets Compliance at NICE Actimize, explains how behavioral intelligence technology can help the finance sector...
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted...
Social media as a threat channel saw a two-fold increase in attacks throughout 2021, according to a report from PhishLabs. In Q4 and throughout 2021, PhishLabs analysed...
ESG surveyed IT, DevOps, and AppDev professionals responsible for evaluating, purchasing, managing, and building application infrastructure. Out of 357 professionals, 64% agree that the adoption of public cloud...
Global organizations continue to struggle against the rising tide of application-specific and web-application attacks. In fact, 50% of all sites tested by NTT Application Security were...