Cybersecurity researchers have disclosed two new attack techniques on certified PDF documents that could potentially enable an attacker to alter a document’s visible content by displaying...
Cybersecurity researchers have disclosed a new backdoor program capable of stealing user login credentials, device information and executing arbitrary commands on Linux systems. The malware dropper...
Researchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs. Researchers from ICS security vendor Claroty published details on...
The ransomware landscape has drastically changed in the past few years and this change is the only thing constant. As targeted ransomware attacks continue cannonading organizations...
Those who can recall the very earliest days of streaming in the mid-1990s might remember anxiously tapping a finger on their mouse while content buffered. Many...
With the Colonial Pipeline ransomware attacks that caused widespread East Coast fuel shortages still fresh in our minds, new WhiteHat Security research has found that application...
Threat Intelligence has become a bucket for a lot of things – from Indicators of Compromise (IOC), to malware reverse engineering, to deep and dark web...
Security researchers have traced an argument injection vulnerability in content management systems (CMS) to flaws in Ruby Gem Dragonfly, an image handling library. New Zealand security consultancy ZX Security...
Attackers were able to impersonate legitimate devices during the Bluetooth pairing process because of inherent security weaknesses in the Bluetooth Core and Bluetooth Mesh specifications that...
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice...