A zero-day security vulnerability in Google's Chrome browser is being actively exploited in the wild.
The Internet behemoth released 11 security patches for Chrome this...
Mobile transactions could’ve been disabled, created and signed by attackers.
Smartphone maker Xiaomi, the world’s number three phone maker behind Apple and Samsung, reported it...
Are you a fan of fitness-focused social networking apps such as Strava? You're not alone. Even military personnel enjoy tracking and sharing their runs....
‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.
There was nothing typical this year at...
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
Zeppelin ransomware...
Many security practitioners take their eye off cloud and software-as-a-service (SaaS) security based on the faulty assumption that the providers are inherently secure. While...
BLACK HAT USA — Las Vegas — A top Microsoft security executive today defended the company's vulnerability disclosure policies as providing enough information for...
The Internet of Things industry's lack of cybersecurity standards is nothing new. We’ve been at this for years. However, with the number of devices expected...
A series of vulnerabilities on the popular asset management platform Device42 could be exploited to give attackers full root access to the system, according...
SAN FRANCISCO---Deepfence,
a pioneer in the emerging security observability and protection space,
today announced the 1.4 release of its open source project ThreatMapper,
a cutting-edge, cloud native...