News

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. A recently surfaced ...
Here’s what cybersecurity watchers want infosec pros to know heading into 2022. No one could have predicted the sheer chaos the cybersecurity industry would experience over the course of 2021.
Court rules ‘War or Hostile Acts’ exclusion doesn’t apply to the pharma giant’s 2017 cyberattack. Unsealed court records show pharmaceutical giant Merck was awarded a $1.4 billion payout ...
Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware. The notorious Lazarus advanced persistent threat (APT) group has ...
Both vulnerabilities are use-after-free issues in Mozilla’s popular web browser. Mozilla has released an emergency update for its Firefox browser that addresses two critical security ...
A slip-up by a malware author has allowed researchers to taxonomize three ransomware variations going by different names. For a year now, threat actors have been using different versions of the ...
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver. The popular protocol for radio controlled (RC ...
Google’s Android security update addressed 43 bugs overall affecting Android handsets, including Samsung phones. Google has fixed two critical bugs affecting its Android handsets. The more ...
The data includes IP addresses for Cobalt Strike C2 servers as well as an archive including numerous tools and training materials for the group, revealing how it performs attacks. An apparently ...
Ransomware attacks targeting hospitals have exacted a human cost as well as financial. Despite hospitals being on the front lines during the pandemic, bad actors have continued to target them with ...
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. After a recent dip, ransomware attacks are back on the rise. According to data ...
The threat actors stole data and used Clop’s leaks site to demand money in an extortion scheme, though no ransomware was deployed. Researchers have identified a set of threat actors (dubbed ...