Ransomware adopts Process Doppelgänging technique to avoid antivirus researchers and avoid detection in a newly identified malware double threat targeting users in the U.S., Kuwait and Germany.
Browsing Category: Featured
Exploitation can result in hackers gaining access to full browsing histories and all of the user’s internet activities.
NIST Updates Cybersecurity Framework to Tackle Supply Chain Threats, Vulnerability Disclosure and More
Version 1.1 includes updates on authentication and identity, self-assessment, supply-chain security and vulnerability disclosure, among other changes.
Uber is tightening policies around its bug bounty program after a 2016 data breach exposed deep flaws in its policies around handling extortion.
Default configuration of WD’s My Cloud storage device keeps port open for unprivileged data exfiltration within a network.
In an unusual move, Metamorfo abuses legitimate, signed Windows binaries to load the malicious code.
Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks around the world, has served up its last internet-paralyzing traffic tsunami.
Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to eavesdrop on consumers with smart devices – and automatically transcribe every word said.
A leaky Mongo database exposed personal information of 25,000 investors and potential investors tied to the Bezop cryptocurrency.
Researchers have found an exploit in Nvidia Tegra X1-based systems that they say cannot be patched.