Cyber Security
‘Anonymous’ social network Yik Yak took more than three months to address vulnerabilities that meant it wasn’t anonymous at all, despite reports from two...
Hi, what are you looking for?
‘Anonymous’ social network Yik Yak took more than three months to address vulnerabilities that meant it wasn’t anonymous at all, despite reports from two...
Meta has fixed a series of bugs that could have allowed a malicious actor to take over a user’s Facebook account, paying their finder...
A cardiologist turned alleged malware developer has been charged with creating the Thanos ransomware builder. Moises Luis Zagala Gonzalez, 55, a citizen of France and Venezuela...
ANALYSIS Five years ago today (May 12), a ransomware attack blamed on a North Korean hacking group hit computers running Microsoft Windows, encrypting data and...
Russian video streaming service RuTube has denied the complete loss of its source code after a cyber-attack timed to coincide with Russia’s ‘Victory Day’ brought the...
A new industry group aims to coordinate efforts improve industrial control system security in an effort geared towards bolstering the resilience of critical infrastructure components. The...
The second edition of Pwn2Own Miami has thrown up dozens of previously undiscovered exploits to industrial control systems, earning security researchers pay-outs of $400,000 in...
Developers of the OpenSSH secure networking utility are ‘future proofing’ the technology by adopting post-quantum cryptography. The latest OpenSSH 9.0 release defaults to the NTRU Prime algorithm...
German police have seized servers powering the infamous darknet marketplace Hydra and confiscated the equivalent of $25 million in bitcoin as part of a...
Cybersecurity researchers have disclosed a code injection flaw in the Spring Cloud computing framework that poses a remote attack risk. On March 28, infosec...
Recent Comments