Google: Predator spyware infected Android devices using zero-days
Google's Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by…
Google's Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by…
A federal judge on Friday blocked the Biden administration from ending the Title 42 public health order on May 23…
Sberbank's vice president and director of cybersecurity, Sergei Lebed, has told participants of the Positive Hack Days forum that the…
During a spirited rant against teachers who groom students last week, Joe Rogan claimed that educators are being arrested for…
By Morten Kjaersgaard, CEO, Heimdal Security How are cybersecurity companies reacting to the Russia-Ukraine conflict and what would […] The…
Shadowserver Foundation researchers find 380,000 open Kubernetes API servers.
CrowdStrike and CyberArk invest in Dig's seed round, which was led by Team8, alongside Merlin Ventures and chairs of MongoDB…
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.
A previously unknown Chinese hacking group known as 'Space Pirates' targets enterprises in the Russian aerospace industry with phishing emails…
Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to…