A new Android malware named ‘Hook’ is being sold by cybercriminals, boasting it can remotely take over mobile devices in real-time using VNC (virtual network computing)....
Suspected Chinese hackers exploited a recently disclosed FortiOS SSL-VPN vulnerability as a zero-day in December, targeting a European government and an African MSP with a new...
Vulnerabilities in four Google Cloud Platform (GCP) projects have earned a pair of security researchers more than $22,000 in bug bounties. The most lucrative project for...
A New York resident has pleaded guilty to charges of conspiracy to commit bank fraud using stolen credit cards purchased on dark web cybercrime marketplaces. Trevor Osagie,...
Security researchers have disclosed a vulnerability that potentially led to exposure of sensitive data and credential theft in WAGO products. Headquartered in Germany with locations worldwide,...
The US Department of Defense (DoD) is holding its third annual Hack The Pentagon challenge, it announced this week. Hack The Pentagon was launched in 2016,...
The attackers who pulled off the recent breach of continuous integration and continuous delivery (CI/CD) platform maker CircleCI got in by compromising an engineer’s laptop with...
In this Help Net Security video, MacKenzie Jackson, Developer Advocate at GitGuardian, offers his cybersecurity predictions for 2032. These include: Source: https://www.helpnetsecurity.com/2023/01/17/threats-that-will-dominate-headlines-in-2023-video/
More than 1,600 instances of the Cacti device monitoring tool reachable over the internet are vulnerable to a critical security issue that hackers have already started...
Cloud security firm Datadog says that one of its RPM GPG signing keys and its passphrase have been exposed during a recent CircleCI security breach. However,...