Developers often need years to address some of the vulnerabilities introduced in their software, a new GitHub report reveals. The report, which is based on the...
Summary In October 2020, during an investigation of a spearphishing campaign targeting the Tibetan community, Recorded Future’s Insikt Group discovered links to an unknown threat activity...
The American telco Verizon has been found leaking customers’ information, potentially for months, due to a flaw in a chat system on its website. Verizon has...
Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to...
VMware has patched a zero-day bug that was disclosed in late November – an escalation-of-privileges flaw that impacts Workspace One and other platforms, for both Windows...
A Google researcher found flaws in Apple’s AWDL protocol that would have allowed for a complete device takeover. A HACK THAT let an attacker take full...
A computer hacker who stole information from Nintendo and was also caught with child pornography on his computer was sentenced Tuesday to three years in prison....
A BEC tactic may go unnoticed if organizations fail to sync their web-based email clients with their desktop-based clients. (Microsoft) The FBI this week made public...
Information Commissioner’s Office struggling to recoup data breach debts, report suggests Up to 68% of fines issued by the UK’s Information Commissioner’s Office (ICO) since January...
A security researcher has earned a $3,000 bug bounty by achieving site-wide cross-site request forgery (CSRF) on job-hunting website Glassdoor. By exploiting the vulnerability, attackers could take control of...