A reconnaissance framework documented by researchers earlier this year has been used by multiple threat groups in watering hole attacks targeting organizations in various...
Hi, what are you looking for?
A reconnaissance framework documented by researchers earlier this year has been used by multiple threat groups in watering hole attacks targeting organizations in various...
Cybercriminals using the Dridex banking Trojan to steal sensitive information from Internet users have changed the way they are distributing the malware, according to...
The GNU Bash vulnerability known as ShellShock is being leveraged by cybercriminals as part of a botnet campaign, researchers reported on Friday.
Law enforcement authorities in the United Kingdom have arrested three individuals suspected of being part of an eastern European criminal organization that uses malware...
Delaware River and Bay Authority Reports Payment Card Data BreachThe Delaware River and Bay Authority (DRBA) published a data security event notice on Friday...
A researcher has identified an exit node on the Tor anonymity network which is set up to maliciously modify the files that go through...
Over the weekend, numerous users noticed that Google was blocking them from accessing websites behind Bit.ly shortened links because they presumably contained malware.
In an effort to address the global cybersecurity workforce gap, the Information Systems Security Association (ISSA) has launched a professional development framework.
In response to accusations that it's spying on users of the e-book reader application Adobe Digital Editions, Adobe Systems has released a new version...
Cisco has released software updates to address a three-year-old vulnerability in the Telnet code of Cisco AsyncOS, the operating systems used in some of...
A Bulgarian national was sentenced on Thursday to 30 months in prison for his role in an international conspiracy to operate the hacking and...
The National Institute of Standards and Technology (NIST) has published a draft of a new guide whose goal is to provide security recommendations on...