John Hammond, security researcher with Huntress, discusses how financially motivated cybercrooks use and abuse cryptocurrency. This is part one of a two-part series on how hackers...
Security researchers have disclosed a HTTP request smuggling vulnerability in HAProxy, the popular open source load balancer. Users of HAProxy, which ships with most mainstream Linux distributions...
Without evidence of wrongdoing, neither public agents nor private companies should be rifling through the photos on your personal devices. Privacy is a set of curtains...
A new distributed denial-of-service (DDoS) botnet that kept growing over the summer has been hammering Russian internet giant Yandex for the past month, the attack peaking...
Three in four organizations are currently utilizing a hybrid work model. Employers and employees alike feel this is the best path moving forward. However, only roughly...
A mobile app developed by New York State to store records of Covid-19 vaccinations was vulnerable to credential forgery, security researchers at NCC Group have discovered. The New...
Machine learning models trained on the visual representation of website code can help improve the accuracy and speed of detecting phishing websites. This is according to a paper (PDF) by...
Running a security operation is now a heavier task than ever before. Assets are moving targets because so many employees are still working from home —...
As we continue to careen down an uncertain path, it’s now primarily expected that hybrid work is here to stay. While this flexible approach to the...
We have malware-as-a-service and ransomware-as-a-service, now get ready for Dropper-as-a-Service (DaaS). Cybercriminals are an ambitious breed and to maximize their profits, they are leveraging DaaS to...