The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…
Samsung has launched a new bug bounty program for its mobile devices with rewards of up to $1,000,000 for reports…
Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late…
Android security updates this month patch 46 vulnerabilities, including a high-severity remote code execution (RCE) exploited in targeted attacks. [...]
South Korea's National Cyber Security Center (NCSC) warns that state-backed DPRK hackers hijacked flaws in a VPN's software update to…
A previously undocumented Android malware named 'LightSpy' has been discovered targeting Russian users, posing on phones as an Alipay app…
A novel Linux Kernel cross-cache attack named SLUBStick has a 99% success in converting a limited heap vulnerability into an arbitrary…
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and…
In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there…
CISA has ordered U.S. Federal Civilian Executive Branch (FCEB) agencies to secure their servers against a VMware ESXi authentication bypass…