The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who...
Everything as a Service (XaaS) has taken the cybersecurity field by storm, with enterprise organizations outsourcing security and development functions to third parties, including Software as...
A security researcher claims he bypassed the tracking protection features built into Apple’s Find My app and AirTag tracking devices with a custom-made AirTag clone. Amid mounting...
Researchers have disclosed critical vulnerabilities in Extensis Portfolio, including a zero-day flaw that’s yet to be patched. On February 17, White Oak Security researchers Michael Rand...
A security researcher has netted a $250,000 bug bounty for disclosing a vulnerability in Coinbase that could have allowed a user to ‘sell’ currency they did...
An open source security tool has been launched with the promise of a “fool-proof way” to detect dangling elastic IP takeovers. Organizations leave themselves vulnerable to...
Researchers at Rutgers University-New Brunswick have published “Face-Mic,” the first work examining how voice command features on virtual reality headsets could lead to major privacy leakages, known as...
Two vulnerabilities in open source monitoring platform Zabbix could allow an attacker to bypass authentication and execute arbitrary code on a targeted server. The security flaws were found...
A security researcher has described how abusing permissions in source code management (SCM) repositories can lead to CI poisoning, or ‘poisoned pipeline attacks’. Developer environments, including...
Malicious hackers are targeting Office 365 users with a spare of ‘MFA fatigue attacks’, bombarding victims with 2FA push notifications to trick them into authenticating their...
Recent Comments