Researchers Uncover New Data Theft Capabilities
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox). Predator…
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox). Predator…
In January 2016, the Tor Project launched its first private bug bounty program on HackerOne. Today the Tor Project announced its public bug bounty program.…
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when connecting smartphones…
Networking technology giant Cisco has become the latest supporter of Manchester’s growing Digital Security Hub (DiSH) cyber security accelerator, launching a series of initiatives to…
We are glad to announce our new functionality for defining Scope! HackerOne’s Vulnerability Taxonomy now includes Severity, Weakness type, and Asset. What is Scope? Your…
A former IT security analyst who exploited an opportunistic ransomware attack to impersonate the attackers and conduct his own, secondary cyber attack on his employer…
A new variant of Mirai botnet thriving on several vulnerabilities has been targeting Linux-based devices. The three found vulnerabilities analyzed by researchers were CVE-2023-27076, CVE-2023-26801,…
The BlackByte ransomware group has claimed responsibility for the cyber attack on the City of Augusta, ending days of speculation and countering the administration’s claim…
When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can be found surfing, partying, or traveling. That’s to be expected for any typical 22-year-old,…
The US and global cybersecurity agencies have issued a joint advisory to bring attention to the activities of “Volt Typhoon,” a state-sponsored cyber actor from…
Proofpoint’s security researchers have identified indications of sophisticated threat actors focusing their attention on small and medium-sized enterprises and service providers operating within that particular…
There’s a little bit of a trap sometimes that can arise in the way that humans understand and process language. Specifically, sometimes we take the…