Rise of the Cyber Supervillain
By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction…
By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction…
Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a…
The National Intelligence Service (NIS) in South Korea warns that North Korean hackers target domestic semiconductor manufacturers in cyber espionage…
A team of academic researchers show that a new set of attacks called 'VoltSchemer' can inject voice commands to manipulate a smartphone's…
The Anatsa banking trojan has been targeting users in Europe by infecting Android devices through malware droppers hosted on Google…
AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems.…
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is…
The first edition of Pwn2Own Automotive has ended with competitors earning $1,323,750 for hacking Tesla twice and demoing 49 zero-day…
Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu…
GrapheneOS, a privacy and security-focused Android-based operating system, has posted a series of tweets on X suggesting that Android should…