The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting…
Attention Android users still on versions 11 or earlier: A critical security update demands your immediate attention. Multiple hacking groups…
Microsoft broke European Union (EU) antitrust rules by bundling in its cloud-based communications and collaboration software Teams when users purchased…
What Is XSS? XSS, short for Cross-Site Scripting, is a common type of vulnerability in web applications that executes arbitrary…
The notorious BlackBasta ransomware group is claiming credit for carrying out cyberattacks on major multinationals in the U.S. The ransomware…
Luxury retailer Neiman Marcus confirmed it suffered a data breach after hackers attempted to sell the company’s database stolen in…
In today’s hyper-interconnected world, managing enterprise digital and technical risk has become a mission-critical priority. But protecting information, people and…
Kubernetes is 10 years’ old. Mid-2024 sees the 10th birthday of the market-leading container orchestration platform. That decade started as…
After a 14-year legal battle, WikiLeaks founder Julian Assange walked out of the United Kingdom’s Belmarsh prison Monday morning, where…
IDOR —short for insecure direct object reference— vulnerabilities are one of the most commonly found web security vulnerabilities in modern…
The FBI is warning of cybercriminals posing as law firms and lawyers that offer cryptocurrency recovery services to victims of…
Cybersecurity firm Resecurity reports that cybercriminals are selling stolen digital identities of Singaporeans on the Dark Web with prices starting…











