There’s been a 2,000% increase of new malware written in Go over the past few years. The number of malware strains coded in the Go programming...
A new Ryuk ransomware variant with worm-like capabilities that allow it to spread to other devices on victims’ local networks has been discovered by the French...
Researchers found a number of privacy and security issues in Amazon’s Alexa skill vetting process, which could lead to attackers stealing data or launching phishing attacks....
Microsoft has won praise from security researchers by making its CodeQL queries public so any organization could use the open source tools to analyze if they...
Several Tibetan organizations were targeted in a cyber-espionage campaign by a state-backed hacking group using a malicious Firefox extension designed to hijack Gmail accounts and infect...
American telecommunications provider T-Mobile has disclosed a data breach after an unknown number of customers were apparently affected by SIM swap attacks. SIM swap fraud (or...
APT31, the China-based threat group, has been leveraging NSA’s secret tools before Shadow Brokers leaked them in April 2017. According to a recent report from Check Point,...
In the spring of 2020, the second New York Cyber Task Force (NYCTF) was formed under the direction of its Executive Director Greg Rattray, gathering key...
Cyberattackers have forced states to take down websites, stolen $36 billion in unemployment payments and exposed millions of residents’ personal information to scammers. COVID-19 made its...
In response to a Trump administration executive order, Joint Base San Antonio is getting ready to test its infrastructure against a simulated electromagnetic pulse attack. An...