New One-Click Exploit Is a Supply Chain Risk for Linux OSes
Researchers have uncovered a vulnerability in a library within the GNOME desktop environment for Linux systems. If embedded in a malicious link, it could enable Read More
Researchers have uncovered a vulnerability in a library within the GNOME desktop environment for Linux systems. If embedded in a malicious link, it could enable Read More
Now that California Gov. Gavin Newsom has signed a bill defining the legal obligations of data brokers into law, businesses that serve people in the Read More
Attackers are employing a new type of certificate abuse in an attempt to spread info-stealing malware, with the aim of collecting credentials and other sensitive data. Read More
The collection of cybercriminal groups behind the infamous Magecart payment-card theft campaigns have come up with a previously unseen technique to hide their credit card skimming code, escaping Read More
Distributed denial of service attacks just keep getting bigger. On Tuesday, a coalition of tech giants revealed the biggest one yet, a DDoS campaign from Read More
Every day more than 8,000 Microsoft threat intelligence experts, researchers, analysts, and threat hunters analyze trillions of daily signals to uncover emerging threats and deliver Read More
Former Uber CISO Joseph Sullivan’s conviction earlier this year on charges related to a 2016 data breach at the company should not be allowed to Read More
Chinese advanced persistent threats (APTs) are known for being sophisticated, but the “ToddyCat” group is bucking the trend, compromising telecommunications organizations in Central and Southeast Asia Read More
Global cyberattacks have risen sharply over the last few years, increasing by 38% in 2022, according to Check Point. Combine this with the increasing cost Read More
Protect AI, maker of Huntr, a bug bounty program for open source software (OSS), is venturing further into the OSS world by licensing three of Read More