The adversary is changing its tools to avoid detection while attacking the vulnerabilities governments issue warnings about. The Russian hacker group behind the historic SolarWinds intrusion...
Over the years, web developers have dreamed up dozens of cute error pages to remind visitors to switch on cookies in their browsers. Most are riffs on...
Russian Foreign Intelligence Service (SVR) operators have switched their attacks to target new vulnerabilities in reaction to US govt advisories published last month with info on...
This week Twitter has begun experimenting with a new feature called ‘Tip Jar,’ which lets Twitter users tip select profiles to support their work. Twitter iOS and...
Imagine a parent’s terror when the geolocation of their child’s smart watch suddenly switches from tennis practice to the middle of the ocean. This was precisely...
Two vulnerabilities discovered in Microsoft Azure Functions have been disclosed, although severity of one of the flaws was mitigated by a separate implementation bug. Last week,...
The Mauritian government is considering plans to monitor and censor social media by intercepting web traffic. In a consultation document (PDF), the country’s Information and Communication Technologies Authority...
Vice President Kamala Harris is prioritizing cybersecurity as chair of the National Space Council, an official said. A presidential directive aimed at implementing cybersecurity in space...
The department is exploring a “lifecycle refresh” for its Enterprise Vulnerability Scanning Solution program. The State Department wants to make sure its security officials can keep...
Security researchers at Qualys have uncovered multiple security vulnerabilities in Exim, one of the most popular mail transfer agents used for public-facing email servers. During a full security...
Recent Comments