CISA urges vendors to patch BrakTooth bugs after exploits release
Researchers have released public exploit code and a proof of concept tool to test Bluetooth devices against System-on-a-Chip (SoC) security…
Researchers have released public exploit code and a proof of concept tool to test Bluetooth devices against System-on-a-Chip (SoC) security…
The holiday shopping season always means big business for phishers, who tend to find increased success this time of year…
Contestants hacked the Samsung Galaxy S21 smartphone during the second day of the Pwn2Own Austin 2021 competition, as well as routers, NAS…
Organizations should start to evaluate other security measures to replace or complement the once-venerable security sandbox.
During the first day of Pwn2Own Austin 2021, contestants won $362,500 after exploiting previously unknown security flaws to hack printers, routers,…
A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing…
The Hive ransomware gang now also encrypts Linux and FreeBSD using new malware variants specifically developed to target these platforms.…
Attackers could use a new macOS vulnerability discovered by Microsoft to bypass System Integrity Protection (SIP) and perform arbitrary operations,…
A new variant of the Android info-stealer called FakeCop has been spotted by Japanese security researchers, who warn that the…
New Android malware can root infected devices to take complete control and silently tweak system settings, as well as evade detection using…