By combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
Read moreCareful with that file, Eugene!
Read moreGoogle's fix to the Bad.Build flaw only partially addresses the issue, say security researchers who discovered it.
Read moreAttackers show renewed relentlessness in exploiting OS vulnerabilities that also circumvent defense and detection measures.
Read moreVirusTotal Data Leak Affects 5K+ Users
July 19 2023Some of the users who were impacted include the US Department of Justice, the NSA, and the FBI, alongside German intelligence agencies.
Read moreHacker Infected & Foiled by Own Infostealer
July 19 2023A prolific threat actor has been operating on Russian-language forums since 2020, but then he accidentally infected his own computer and sold off its contents to threat researchers.
Read moreName That Toon: Shark Sighting
July 19 2023Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreThe first compromise didn't get the crooks as far as they wanted, so they found a second one that did...
Read moreThe cybercrime group has given its backdoor malware a facelift in an attempt to evade detection, making some bug fixes and setting itself up to deliver its latest crimeware...
Read moreA barrage of targeted attacks against vulnerable installations peaked at 1.3 million against 157,000 sites over the weekend, aimed at unauthenticated code execution.
Read more
Recent Comments