by
Paul Ducklin
Apple just pushed out an emergency update for two zero-day bugs that are apparently actively being exploited.
There’s a remote code execution hole (RCE)...
The North Korean APT is using a fake job posting for Coinbase in a cyberespionage campaign targeting users of both Apple and Intel-based systems.
North...
Chances are your business has both an e-commerce platform and a content management system. Perhaps they're one and the same. Together, these technologies drive...
by
Paul Ducklin
The latest update to Google’s Chrome browser is out, bumping the four-part version number to 104.0.5112.101 (Mac and Linux), or to 104.0.5112.102 (Windows).
According...
Microsoft announced general availability of the Tamper Protection in Microsoft Defender for Endpoints on macOS. The feature, which has been in public preview since...
by
Naked Security writer
You’ve almost certainly seen and heard the word Conti in the context of cybercrime.
Conti is the name of a well-known ransomware gang...
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
A...
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
A...
Mobile transactions could’ve been disabled, created and signed by attackers.
Smartphone maker Xiaomi, the world’s number three phone maker behind Apple and Samsung, reported it...