Stealer logs represent one of the primary threat vectors for modern companies. However, many security teams are still focused on...
(Reuters) – German security officials have detected another cyber attack on the email accounts of members of the federal parliament, Der Spiegel reported on Friday. The...
Purple Fox, a Windows-based exploit kit, has now been upgraded with a worm module that infects all the Windows systems reachable over the internet. The malware...
A Windows hacker has found a never-before-seen Easter egg in the Windows 95 Internet Mail application, twenty-five years after the software was released. When developing software,...
British clothing brand FatFace has sent a controversial ‘confidential’ data breach notification to customers after suffering a ransomware attack earlier this year. This week, customers began...
New malware with extensive spyware capabilities steals data from infected Android devices and is designed to automatically trigger whenever new info is read to be exfiltrated....
Some programs are already operating under a zero trust framework, but the enterprise as a whole still needs basic tools for things like identity, credentials and...
Interpol and US Homeland Security Investigations (HSI) have issued a joint warning about the “serious health hazard” posed by the sale of fake Covid-19 vaccines and treatments online....
A US man has been charged with orchestrating a distributed denial-of-service (DDoS) attack that disrupted internet access across Plattsburg, New York. Thomas A. Johnson, 24, of Boone, North Carolina, performed...
A security researcher has detailed how they were able to exploit GDPR laws to leak sensitive personal information from the systems put in place to protect it. Full-time...
A security researcher has launched a GoFundMe campaign to secure legal representation after a responsible disclosure notice apparently went sour. In a tweet dated March 8, Rob Dyke,...
Recent Comments