On Wednesday, an ex-Uber CSO was found guilty of federal charges related to payments he secretly approved to hackers who...
Security researchers on Thursday documented and described a new injection technique capable of extracting sensitive data from PDF files. “One simple link can compromise the entire...
Retailers are on high alert during holiday season of Magecart attacks, which implant malicious computer code into websites and third-party suppliers of digital systems to steal...
MILAN (Reuters) – Computers hacked at Italian defence group Leonardo between 2015 and 2017 belonged to a unit that makes components for both commercial and military...
This week Samsung has started rolling out Android’s December security updates to mobile devices to patch critical security vulnerabilities in the operating system and related components. This...
Microsoft has addressed critical remote code execution vulnerabilities in multiple SharePoint versions with this month’s Office security updates. In total, this month the company released 23...
In mid-October, a new post, written in Russian, appeared on a cybercriminal forum. It advertised network access to a large electronics manufacturer, including backups of corporate...
New York law firm Brooklyn Defender Services says it has been struck by a data breach involving sensitive personal information belonging to its low income, government-funded clients. The...
An open source Python tool used for finding potential phishing websites enables network defenders to identify risky domains before attacks start, Black Hat Europe attendees heard...
Google is offering an enhanced bug bounty for “high quality” reports that show how vulnerabilities in the open source V8 JavaScript engine might potentially be used as part...
UPDATED The contents of PDF documents can be exfiltrated to a remote server using an exploit contained in a single link, potentially exposing a wealth of sensitive...
Recent Comments