The manufacturing sector is plagued with a constant barrage of cyberattacks. For instance, Panasonic recently suffered a breach after an unknown third-party infiltrated one of its servers and...
In the span of only four months, four large Android malware families were spread via Google Play, resulting in 300.000+ infections via multiple dropper apps, according to ThreatFabric research. ...
A notorious group of hackers has been found targeting customers of banks with phony fraud alerts and stealing thousands of dollars from their bank accounts. The...
North Korean state-sponsored hackers posed as Samsung recruiters and sent fake job offers to employees at South Korean security companies that sell anti-malware software, Google said...
Coro released an extensive cybersecurity research report revealing a true market failure: a severe lack of preparedness of the mid-market sector, which is comprised of companies...
Cloud misconfiguration issues have lately touched new heights as more and more data is exposed to the public. Poorly configured cloud services can and will be...
Researchers have released a new fuzzing tool used for finding novel HTTP request smuggling techniques. The tool, dubbed ‘T-Reqs’, was built by a team from Northeastern University,...
Hide My WP, a popular WordPress security plugin, contained a serious SQL injection (SQLi) vulnerability and a security flaw that enabled unauthenticated attackers to deactivate the software. Now patched, the...
More than one in five cybersecurity professionals in the UK say they have experienced discrimination at work in the last year, according to a report from...
Nearly half (45%) of companies do not employ a Chief Information Security Officer (CISO) as part of their security strategy. Of this group, 58% of security,...