BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations,...
Read more →Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations,...
Read more →There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security...
Read more →In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data...
Read more →As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface....
Read more →Rust’s strong focus on memory safety, which prevents common vulnerabilities such as buffer overflows, makes it a choice for threat...
Read more →An infostealer disguised as the Adobe Reader installation has been observed. The file is disseminated in PDF format and prompts users...
Read more →The South Australian government has begun its long-awaited enterprise resource planning (ERP) replacement, with Oracle to provide the platform. In...
Read more →Microsoft’s patch cycle this month has a handful of notable vulnerabilities – apparently none of them zero-days – in a...
Read more →Cybersecurity researchers at Fortinet’s FortiGuard Labs have discovered a new threat called Vcurms malware targeting popular browsers and apps for...
Read more →Software developers who use Apple’s App Store will soon be able to distribute apps to EU users directly from their...
Read more →The KB5035849 cumulative update released during today’s Patch Tuesday fails to install on Windows 10 and Windows Server systems with...
Read more →February was a particularly busy month for search-based malvertising with the number of incidents we documented almost doubling. We saw...
Read more →