A security researcher scored a $70k bug bounty payout after accidentally discovering a Google Pixel lock-screen bypass hack. The vulnerability, discovered by David Schütz, meant an attacker could...
Deep Instinct released its 2022 Bi-Annual Cyber Threat Report which focuses on the top malware and ransomware trends and tactics from the first half of 2022...
Organizations plan to invest in DevSecOps in 2023, and the level of urgency for them to do so has grown. In a recent survey conducted by the Neustar...
IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks capable of impacting video conferencing. In this Help Net Security video, George...
Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at least a...
When people find out that I’ve spent much of my career being hired by companies to steal their secrets, they usually ask, “Are we doing enough? Do...
Ukraine’s cyber police and Europol have identified and arrested five key members of an international investment fraud ring estimated to have caused losses of over €200...
A new information-stealing malware named ‘StrelaStealer’ is actively stealing email account credentials from Outlook and Thunderbird, two widely used email clients. This behavior deviates from most...
Despite “a handful” of DDoS attacks targeting state and local election websites and some technical glitches affecting voting equipment, CISA says it saw “no activity” that...
Titania launched an independent research report that uncovers the impact of exploitable misconfigurations on the security of networks in the US federal government. The study, “The impact of...