A critical security flaw in Android could be used by attackers to “assume the identity” of legitimate apps in order to carry out on-device phishing attacks, say researchers.
Read moreMalware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.
Read moreA variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.
Read moreNearly 70% of businesses struggle to recruit, hire, and retain cybersecurity talent, and many link security incidents to lack of skills.
Read moreSecurity 101: SQL Injection
May 27 2020A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can...
Read moreHackerOne Bounties Hit $100M Milestone
May 27 2020The bug-hunting platform has now paid more than $100 million in bounties since October 2013.
Read moreStanding Privilege: The Attacker’s Advantage
May 27 2020The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.
Read moreGDPR Enforcement Loosens Amid Pandemic
May 27 2020The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face...
Read moreApple's current round of updates have been officially anounced in the company's latest Security Advisory emails.
Read morePonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.
Read more
Recent Comments