macOS Malware Campaign Showcases Novel Delivery Technique
Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a…
Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a…
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is…
By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted…
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the…
Security researchers are observing exploitation attempts for the CVE-2023-22527 remote code execution flaw vulnerability that affects outdated versions of Atlassian Confluence servers.…
As former President Donald Trump moves closer to locking up the 2024 Republican nomination, speculation swirls surrounding whom he'll name…
Ambient light sensors on smart-device screens can effectively be turned into a camera, opening up yet another path to snooping…
By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original…
A set of nine vulnerabilities, collectively called 'PixieFail,' impact the IPv6 network protocol stack of Tianocore's EDK II, the open-source…