Schneider Electric has patched several new vulnerabilities that expose its EVlink electric vehicle charging stations to remote hacker attacks. Schneider announced the availability of patches on...
Researchers have discovered a new variant of Echelon credential stealer malware that attempts to steal crypto wallets belonging to users of several file-sharing and messaging platforms....
Officials must weigh the benefits and risks on a case-by-case basis. For decades, cyberattacks, counterterrorism events and acts of espionage happened in secret—and stayed there. Even when...
The cryptographic protocol is at the heart of a ‘zero trust’ proposal pioneered by Google that has a fan base within the federal government. The Biden...
A new ransomware operation named Rook has appeared recently on the cyber-crime space, declaring a desperate need to make “a lot of money” by breaching corporate...
A Romanian team has ended a run of near misses to be crowned the 2021 winners of Trend Micro’s Raimund Genes Cup. PwnThyBytes finally topped the leaderboard...
A subdomain takeover vulnerability in a popular WordPress hosting platform could allow an attacker to deploy malicious code to a victim by impersonating a legitimate website....
Vulnerabilities in wireless chip designs could allow malicious hackers to steal data and passwords from devices, according to security researchers. According to the group, from the Technical University...
VK is finally introducing two-factor authentication on all its services and plans to make it mandatory in February 2022 for administrators of large communities. VKontakte, or...
Lack of shared recognition of problems increases the pain, according to a new survey. Cybersecurity center leaders and non-IT employees are often at odds as security...
Recent Comments