Source
DARKReading
The group has been operating for over a year, promoting their tools in hacking forums, stealing credit card information, and using typosquatting techniques to target open source software flaws.
Today, the processing of mountain-high stacks of alarms is considered "security." That system is failing customers and the cybersecurity workforce.
Some 400 mobile apps have posed as legitimate software on Google Play and the Apple App Store over the past year, and were designed to steal Facebook user credentials.
Test methodologies published today, and their scope includes security effectiveness, performance, stability and reliability, and total cost of ownership.
The infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
Exploit allows unsigned and unnotarized macOS applications to bypass Gatekeeper and other security, without notifying the user.
Russian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.
The trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges.
Cybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security.
The malware-as-a-service group Eternity is selling a one-stop shop for various malware modules it's been distributing individually via a subscription model on Telegram.