OAuth+XSS Attack Threatens Millions of Web Users With Account Takeover
An attack flow that combines API flaws within “log in with” implementations and Web injection bugs could affect millions of…
Identity illuminated
An attack flow that combines API flaws within “log in with” implementations and Web injection bugs could affect millions of…
This year’s conference will be a treasure trove of insights for cybersecurity professionals. This year’s conference will be a treasure…
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email…
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must…
The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research…
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service…
The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit as…
French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to rid compromised hosts of a known…
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with…
A large text-message phishing attack campaign attributed to the China-based Smishing Triad employs malicious iMessages. A large text-message phishing attack…