Cyber Security
Hackers have exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal cryptocurrency from customers. When customers would deposit or purchase cryptocurrency...
Hi, what are you looking for?
Hackers have exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal cryptocurrency from customers. When customers would deposit or purchase cryptocurrency...
A new program is aiming to reward developers and security researchers who make improvements to critical infrastructure based on open source technology. The Secure...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’...
Security researchers have identified multiple workflows in popular continuous integration and development (CI/CD) service GitHub Actions that are vulnerable to command execution. A research...
Supply chain attacks on the rise, costing businesses more year on year as organizations failing to implement zero trust strategies. This is according to...
INTERVIEW The security of the software supply chain has rocketed up the infosec agenda since The Daily Swig last spoke to Brian Fox, co-founder and CTO at...
The Python Package Index (PyPI) is rolling out two-factor authentication (2FA) for “critical projects” in the form of physical security keys. Mindful of the growing threat...
Apple has launched a security bug bounty for its new Lockdown Mode feature, which aims to give users heightened protection against spyware attacks. Lockdown Mode, which...
Deliveries of prepared meals to thousands of vulnerable people in England continue to be disrupted following a “sophisticated” cyber-attack on food distributor Apetito. Apetito’s...
The number of new ransomware families and unique variants has fallen over the last year, according to new research from WithSecure. The company, formerly...
Recent Comments