The API Security Crisis: Why Your Company Could Be Next
You're only as strong as your weakest security link.
You're only as strong as your weakest security link.
Cybersecurity startup LeakSignal, a finalists in this year's Black Hat USA Startup Spotlight competition, helps organizations see where data is…
A previously undocumented Android malware named 'LightSpy' has been discovered targeting Russian users, posing on phones as an Alipay app…
U.S. and German law enforcement seized the domain of the crypto wallet platform Cryptonator, used by ransomware gangs, darknet marketplaces,…
Twilio has finally killed off its Authy for Desktop application, forcibly logging users out of the desktop application. [...]
A new Android malware that researchers call 'BingoMod' can wipe devices after successfully stealing money from the victims' bank accounts using…
A malicious campaign targeting Android devices worldwide utilizes thousands of Telegram bots to infect devices with SMS-stealing malware and steal…
Google Chrome now comes with better cookie protection on Windows systems, with the addition of app-bound encryption, which improves defenses…
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…
Threat actors are exploiting a misconfiguration in Selenium Grid, a popular web app testing framework, to deploy a modified XMRig tool…