Researchers have discovered at least 9,000 exposed VNC (virtual network computing) endpoints that can be accessed and used without authentication, allowing threat actors easy access to...
The SOVA Android banking trojan continues to evolve with new features, code improvements, and the addition of a new ransomware feature that encrypts files on mobile...
The oversight group wants more detailed information on the HHS’ cyberdefenses as digital networks for critical infrastructure remain a target for malicious actors. The bicameral Cyberspace...
State election officials said that they “need help at the federal level” to counter the threat. Threats against election officials and the spread of false claims...
The information technology industry remains two moves behind attackers subjecting businesses to wave after wave of predictable attacks, investigative journalist Kim Zetter told delegates to Black...
Bug bounty programs can be a useful part of a layered security approach, but stakeholders have been urged to maintain a tight grip on their data...
At least three groups split from the Conti ransomware operation have adopted BazarCall phishing tactics as the primary method to gain initial access to a victim’s...
A new class of HTTP request smuggling attack allowed a security researcher to compromise multiple popular websites including Amazon and Akamai, break TLS, and exploit Apache servers. Speaking...
Black Hat USA attendees were given a firsthand look at the new and improved ReNgine, which includes several new features for penetration testers and red teamers. ReNgine is...
The guide for state and local election officials offers free tools to help mitigate digital threats and safeguard voting systems from outside intrusion. The Cybersecurity and...
Recent Comments