After effectively shutting down their entire operation for several months, between November and February, the Clop ransomware is now back, according to NCC Group researchers. “CL0P...
Hackers are showing an increased interest in the Windows Subsystem for Linux (WSL) as an attack surface as they build new malware, the more advanced samples...
Cybercriminals are offering to sell for thousands of U.S. dollars network access credentials for higher education institutions based in the United States. This type of advertisement...
GitHub revealed today that an attacker stole the login details of roughly 100,000 npm accounts during a mid-April security breach with the help of stolen OAuth app...
The maintainers of Guzzle, the popular HTTP client for PHP applications, have addressed a high severity vulnerability leading to cross-domain cookie leakage. Drupal, the open source content management...
A ‘security researcher’ accused of unethical activity through the alleged hijack of a popular open source project insists that their actions were not malicious. Last week,...
The secretary delivered a speech outlining the administration’s policy toward Beijing as Congress tries to reconcile legislation that would provide at least $50 billion to increase...
LinkedIn has launched a public bug bounty program to replace the invite-only program that has been running since 2014. Critical security vulnerabilities discovered on the business-oriented social media platform will...
Canadian healthcare service provider Scarborough Health Network (SHN) has warned that a data breach may have exposed patient healthcare records. In a breach notice, SHN explained that its IT...
A hearing the committee held leading up to the bill’s markup focused on a shortage of procurement officials in the federal workforce, which an industry witness...
Recent Comments