The agency also warned that getting attackers out of networks will be complex—especially because they are monitoring IT and cybersecurity employees’ emails. The fallout from the...
Kerberos, a computer-network authentication protocol, can be bypassed using a new attack technique revealed with a proof-of-concept exploit code. The technique, dubbed Bronze Bit attack, exploits the CVE-2020-17049...
Cyberattacks on the healthcare sector are not just causing damage to digital assets, they are making life-threatening impacts as well. According to a recent report from Nature...
The hackers behind Zebrocy malware have added a new chapter in their malware delivery tactics book. Key points about new Zebrocy variants Researchers at Intezer have analyzed the...
Security vulnerabilities in the direct file transfer applications of popular smartphone makers allow attackers to send malicious files to mobile devices, a security researcher has found. In a...
UPDATED Network security appliance firm F5 has warned of a series of vulnerabilities affecting its BIG-IP products, including a cross-site scripting (XSS) vulnerability that’s said to pose a critical...
Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth...
Report also found that the catch rate for selfie fraud was five times greater than for ID fraud, highlighting the growing importance of capturing a selfie...
Positive Technologies has published its “5G standalone core security assessment”. The report discusses vulnerabilities and threats for subscribers and mobile network operators, which stem from the use of...
Today’s customers rarely bat an eye when they receive a security alert from a company with which they do business. That’s because large tech companies have baked identity...