Bug bounty rewards have breached the $1 million mark, and there are reports of even higher payouts within the ethical hacking community. But are these ‘mega...
ANALYSIS Numerous issues were discovered with User-Agent parsing libraries as the major version number of web browsers went from one digit to two digits a decade ago. Now that we are...
Cross-site leaks (XS-Leak) are a family of browser-side channels that can be used to infer information about users. Web developers and browser vendors often misunderstand XS-Leak...
Patching is a fact of life for IT administrators. And, although it is essential to maintain security, keeping up with vendors’ patch release cycles is a...
Taking responsibility for our personal privacy and security is more important than ever, and browser developers continually support these efforts with new and improved privacy and security features....
In just a few weeks’ time, a new data security law will come into force in the People’s Republic of China. The Data Security Law (DSL)...
Reports that Colonial Pipeline paid a $5 million ransom to restore operations on the US’ largest fuel pipeline send cybercriminals an unfortunate signal, security professionals have...
Crippled by economic sanctions and isolated from the rest of the world bar China, North Korea is increasingly relying on cybercrime to keep its economy running. Over recent...
FireEye has discovered additional details about the SUNBURST backdoor since our initial publication on Dec. 13, 2020. Before diving into the technical depth of this malware,...
Recent Comments