Sophisticated Android Spyware Targets Users in Russia
Researchers say “LianSpy” malware has been in use in a covert data gathering operation that’s gone undetected for at least…
Identity illuminated
Researchers say “LianSpy” malware has been in use in a covert data gathering operation that’s gone undetected for at least…
Though TikTok is expected to adhere to certain COPPA-outlined measures, the social media giant has failed to meet those expectations,…
In the cloud, patches disseminate automatically. On your computer, you get notified. IoT devices, meanwhile, can escape attention for years…
A ransomware group called Dark Angels made headlines this past week when it was revealed the crime group recently received…
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.…
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data…
The enterprise resource planning platform bug CVE-2024-38856 has a vulnerability-severity score of 9.8 out of 10 on the CVSS scale…
Cybersecurity startup LeakSignal, a finalists in this year’s Black Hat USA Startup Spotlight competition, helps organizations see where data is…
Cybersecurity startup Knostic, a finalists in this year’s Black Hat USA Startup Spotlight competition, adds guardrails to how AI uses…
Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric…