A House hearing saw expert testimony emphasizing the need for steady funding to cybersecurity programs in water utility providers––especially in rural regions. Fortifying the cybersecurity protocols...
A prototype pollution bug in the Chromium project allowed attackers to bypass Sanitizer API, a built-in browser library for removing potentially malicious code from user-controlled input...
A vulnerability in the Python programming language that has been overlooked for 15 years is now back in the spotlight as it likely affects more than...
Phishing actors are abusing LinkedIn’s Smart Link feature to bypass email security products and successfully redirect targeted users to phishing pages that steal payment information. Smart...
A security flaw in Parse Server that enabled brute-force guessing of sensitive user data on the API server module for Node.js and the Express WAF has...
The departments of Defense and Justice want the agency to take a more comprehensive approach to preventing foreign adversaries from accessing Americans’ communications and data. The...
Experts advised the intelligence community to have “more holistic conversations” with the public about the threat landscape. The U.S. intelligence community and federal officials need to...
Hackers have compromised the support system of American video game publisher 2K and now are sending support tickets to gamers containing the RedLine password-stealing malware. 2K...
Digital assets trading firm Wintermute has been hacked and lost $162.2 million in DeFi operations, the company CEO, Evgeny Gaevoy, announced earlier today. Wintermute provides liquidity to over...
“Software can’t be the best without being secure.” This is according to Tanya Janca, who warns that businesses will “find themselves behind the security curve, so to...
Recent Comments