Sharing Knowledge at 44CON
The infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
The infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
Few organizations are able to continue operating after being hit by ransomware, let alone be able to quickly […] The…
Access tokens for other Teams users can be recovered, allowing attackers to move from a single compromise to the ability…
Security analysts have found a severe security vulnerability in the desktop app for Microsoft Teams that gives threat actors access…
Outdoor apparel brand 'The North Face' was targeted in a large-scale credential stuffing attack that has resulted in the hacking…
A reverse-proxy Phishing-as-a-Service (PaaS) platform called EvilProxy has emerged, promising to steal authentication tokens to bypass multi-factor authentication (MFA) on…
A new and upgraded version of the SharkBot malware has returned to Google's Play Store, targeting banking logins of Android…
Cybercriminals using Prynt Stealer to collect data from victims are being swindled by the malware developer, who also receives a…
Thousands of corporate mobile apps developed by businesses for use by their customers contain hard-coded AWS tokens that can be…
On Monday, Florida Gov. Ron DeSantis tweeted, "Florida ranks #1 among the states for economic freedom!" This ranking refers to…