The idea sprung from a sense of moral outrage Cybersecurity and Infrastructure Security Agency Director Jen Easterly identified with. Cloud service providers should not be allowed...
The US Department of Homeland Security (DHS) has launched a bug bounty program inviting selected security researchers to test for vulnerabilities in its systems. Dubbed ‘Hack the DHS’,...
Officials stressed the importance of maintaining a bill of materials for software in flagging the “Log4j” vulnerability. The Cybersecurity and Infrastructure Security Agency has added a...
The Python Package Index (PyPI) has removed malware-deploying and data-stealing packages that were collectively downloaded thousands of times. The trio of malicious packages duped unsuspecting users...
Cybercrime forums are evolving to include more mature dispute resolution and arbitration procedures which are in some ways comparable to legitimate courts. A recent blog post by...
Computer chip giant Intel has launched a bug bounty program with Belgium-based Intigriti, after switching from rival, US-based ethical hacking platform HackerOne. Intel is applying a 12-month bonus...
A high-severity vulnerability in several cardiac healthcare devices could allow attackers to access privileged accounts without a password and seize control of the devices. The authentication bypass flaw...
Researchers at the University of Darmstadt, Brescia, CNIT, and the Secure Mobile Networking Lab, have published a paper that proves it’s possible to extract passwords and...
Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we have compiled...
The US Federal Trade Commission (FTC) said Americans reported losing $148 million to gift card scams during the first nine months of 2021, following a significant...
Recent Comments