Developers of the OpenSSH secure networking utility are ‘future proofing’ the technology by adopting post-quantum cryptography. The latest OpenSSH 9.0 release defaults to the NTRU Prime algorithm – a...
Reply comments are now due in 30 days to the Federal Communications Commission. The Federal Communications Commission should consider imposing comprehensive tests and fines—after fair warning...
An access control vulnerability in open source scheduling platform Easy!Appointments gave unauthenticated attackers easy access to personally identifiable information (PII), a security researcher has revealed. Now patched, the...
Miscreants have started abusing the recently discovered Spring4Shell vulnerability as a vector for the spread of the Mirai botnet. Trend Micro researchers have noticed the active exploitation of...
Deepfence has launched new open source tool PacketStreamer that captures network traffic from multiple sources to reveal potential hacking behaviors. PacketStreamer sensors collect raw network packets on...
A malspam campaign has been found distributing the new META malware, a new info-stealer malware that appears to be rising in popularity among cybercriminals. META is...
A hacking group used the Conti’s leaked ransomware source code to create their own ransomware to use in cyberattacks against Russian organizations. While it is common...
A new Android banking malware named Octo has appeared in the wild, featuring remote access capabilities that allow malicious operators to perform on-device fraud. Octo is...
A Government Accountability Office official says the watchdog agency consulted with private sector entities in producing a report of 12 areas it’s planning to focus on...
A third member of the FIN7 cybercrime gang has been sentenced for his role in a scheme that targeted hundreds of companies with payment data stealing malware....
Recent Comments