A team of researchers has demonstrated that the cost of breaking the SHA1 cryptographic hash function is lower than previously estimated, which is why...
Hi, what are you looking for?
A team of researchers has demonstrated that the cost of breaking the SHA1 cryptographic hash function is lower than previously estimated, which is why...
A threat group believed to be operating out of Iran has created a network of fake LinkedIn profiles as part of a campaign aimed...
The group responsible for the development of the "vigilante malware" known as Wifatch has published the project’s source code.
Researchers at FireEye have been monitoring a malicious adware campaign that has affected the devices of Android users in more than 20 countries.
Amazon announced on Tuesday the availability of AWS WAF, a web application firewall that helps Amazon Web Services customers protect their apps from common...
Cisco says it has caused significant damage to the operations of a cybercriminal group that might have made millions of dollars using ransomware distributed...
While monitoring the activities of the advanced persistent threat (APT) actor known as Winnti, researchers at Kaspersky Lab discovered a new platform that the...
Cisco has announced a new and more streamlined format for disclosing security vulnerabilities in an effort to make it easier for network administrators to...
Malicious actors breached an organization’s systems and maintained persistent control over its network for months via an Internet-facing webmail server.
The nuclear industry still doesn’t fully understand the risk posed by cyberattacks, according to a new report published on Monday by Chatham House.The report,...
A piece of Apple iOS malware dubbed by researchers “YiSpecter” has been abusing private APIs and enterprise certificates to infect both jailbroken and non-jailbroken...