The survey indicates cyber concerns do not always resonate with C-suite decision makers. Cybersecurity is top of mind for chief information security officers, but more than...
The 2022 edition of Apple’s Worldwide Developers Conference (WWDC) kicked off this week, with numerous security and privacy developments placed front and center among the firm’s...
ANALYSIS Virtual private network (VPN) providers are digging in their heels, following the introduction of a new law in India requiring them to collect user data and keep it...
The Emotet botnet is now attempting to infect potential victims with a credit card stealer module designed to harvest credit card information stored in Google Chrome...
The Cuba ransomware operation has returned to regular operations with a new version of its malware found used in recent attacks. Cuba ransomware’s activity reached a...
Ethical hackers have earned more than $300,000 after uncovering a variety of flaws in Google Cloud Platform (GCP). The top seven responsibly disclosed vulnerabilities that qualified...
ANALYSIS The HTTP/3 protocol has received RFC 9114 standardization – a boost for internet security, but not one without hurdles for web developers. This week, the Internet...
Lured by both money and the prospect of greater freedom, ethical hackers are increasingly keen on bug bounty hunting, with two thirds considering it as a...
One witness testifying before the Senate Homeland Security and Governmental Affairs Committee called for greater international enforcement against money laundering. Historic sanctions against Russia-based cryptocurrency exchanges...
A chained, zero-day exploit could potentially expose all user data in the backend of the companion mobile application for a popular smart weight scale, security researchers have claimed....
Recent Comments