Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to...
A computer hacker who stole information from Nintendo and was also caught with child pornography on his computer was sentenced Tuesday to three years in prison....
IBM X-Force has released a report on malicious cyber actors targeting the COVID-19 cold chain—an integral part of delivering and storing a vaccine at safe temperatures....
URL shorteners have a notorious reputation for being bad for both privacy and security. Users often use them to share sensitive, unprotected files stored in the cloud via...
“In the lifecycle of vulnerability management, where investigation, response, and remediation have all changed from a periodic to a continuous model, discovery has lagged behind,” muses...
A group of security researchers have earned $4,000 after discovering a server-side request forgery (SSRF) vulnerability in Snapchat. The team – Ben Sadeghipour, Sera Brocious, and Brett Buerhaus...
An Indian national on Monday was sentenced to 20 years in prison in the Southern District of Texas for operating and funding India-based call centers that defrauded US...
A nation-state actor known for its cyber espionage campaigns since 2012 is now using coin miner techniques to stay under the radar and establish persistence on...
A newly identified family of the information-stealing Discord malware called CursedGrabber is making rounds in open-source ecosystems. As a part of the CursedGrabber campaign, Sonatype has discovered more...
Experts found a critical flaw in Real-Time Automation’s (RTA) 499ES EtherNet/IP stack that could allow hacking industrial control systems. Tracked as CVE-2020-25159, the flaw is rated 9.8...