UPDATED A newly launched regex-scanning tool has been used by its architects to unearth multiple regular expression denial-of-service (ReDoS) vulnerabilities in popular NPM, Python, and Ruby dependencies....
Threat actors have started to use ‘Promoted’ tweets, otherwise known as Twitter ads, to spread cryptocurrency giveaway scams. For some time, BleepingComputer has been reporting on...
Researchers have now disclosed more information on how they were able to breach multiple websites of the Indian government. Last month, researchers from the Sakura Samurai...
Today, researchers have exposed common weaknesses lurking in the latest smart sex toys that can be exploited by attackers. As more as more adult toy brands enter...
The Homeland and Cyber Threat Act would amend the Foreign Sovereign Immunities Act to give Americans legal recourse for damages caused by foreign hackers. A bipartisan...
The developers of the Kentico CMS have patched a critical vulnerability that could be exploited to compromise backend databases. The vulnerability was disclosed by Obrela Labs penetration tester...
Researchers from the Counter Threat Unit (CTU) at Secureworks have discovered a possible link to China while examining how SolarWinds servers were used to deploy malware. In late 2020, Secureworks CTU researchers observed...
Formula One team Williams Racing had to abandon plans to unveil its new car via an augmented reality (AR) app after the mobile application was hacked...
An overview of the hacking activity on the HackerOne vulnerability coordination and bug bounty platform shows that misconfiguration of cloud resources is quickly becoming a hot...
In the wake of the biggest breach in history, DomainTools’ new survey on “The Impact of the SolarWinds Breach on Cybersecurity” aims to capture the effects...