A spyware-enabled Android app module that can gather details about files kept on devices and send them to attackers. Additionally,...
A new Ryuk ransomware variant with worm-like capabilities that allow it to spread to other devices on victims’ local networks has been discovered by the French...
Researchers found a number of privacy and security issues in Amazon’s Alexa skill vetting process, which could lead to attackers stealing data or launching phishing attacks....
Microsoft has won praise from security researchers by making its CodeQL queries public so any organization could use the open source tools to analyze if they...
Several Tibetan organizations were targeted in a cyber-espionage campaign by a state-backed hacking group using a malicious Firefox extension designed to hijack Gmail accounts and infect...
American telecommunications provider T-Mobile has disclosed a data breach after an unknown number of customers were apparently affected by SIM swap attacks. SIM swap fraud (or...
APT31, the China-based threat group, has been leveraging NSA’s secret tools before Shadow Brokers leaked them in April 2017. According to a recent report from Check Point,...
In the spring of 2020, the second New York Cyber Task Force (NYCTF) was formed under the direction of its Executive Director Greg Rattray, gathering key...
Cyberattackers have forced states to take down websites, stolen $36 billion in unemployment payments and exposed millions of residents’ personal information to scammers. COVID-19 made its...
In response to a Trump administration executive order, Joint Base San Antonio is getting ready to test its infrastructure against a simulated electromagnetic pulse attack. An...
Security researchers from Proofpoint have intercepted a sneaky, albeit low-volume phishing campaign designed to plant malware on the systems of Tibetan organizations via a malicious Firefox browser extension....
Recent Comments