Why APIs are Critical to Agile Development, The Security Gaps and Vulnerabilities That They Can Offer Bad Actors, and What…
Browsing: Malware and Vulnerabilities
203 senior security and risk professionals reveal a missed opportunity to leverage DNS throughout the threat analysis and response cycle …
Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and over) in the United States.…
A new Android malware strain, based on the Xerxes banking Trojan, has been discovered by analysts at ThreatFabric, the mobile security…
An advisory published by the UK National Cyber Security Centre (NCSC) warns of activity by Russian hacking group APT29 and…
A security firm that last month highlighted spyware hidden in Chinese tax software issued a new report Tuesday shedding more light on…
As reported by The Guardian, one of Catalonia’s most senior politicians has been warned his mobile phone was targeted using spyware…
ESET researchers have discovered a new operation within a long-running cyber-espionage campaign in the Middle East, apparently with links to…
SAP has patched a critical vulnerability impacting the LM Configuration Wizard component in NetWeaver Application Server (AS) Java platform, which…
A previously unknown flaw in the videoconferencing software Zoom could allow a hacker to remotely commandeer computers running old versions…