The United Nations flag (Getty Images) The UN cybercrime convention threatens security research. The US should do something about it The UN treaty's broad and ambiguous language risks stifling vital work. 4 hours ago By Ilona Cohen
N. Korean hacker silhouette with North Korean Flag. (Getty Images) North Korean-linked hackers were caught experimenting with new macOS malware Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild. 2 days ago By Christian Vasquez
A hacker with China’s national flag in background. (Getty Images) China’s elite hackers expand target list to European Union Beijing's hackers are also using an open-source VPN tool for persistence. Nov 7, 2024 By Christian Vasquez
Screen of smartphone with icons. (Getty Images) Android warns of Qualcomm exploit in latest security bulletin The November security bulletin includes two CVE's reportedly exploited in the wild. Nov 4, 2024 By Christian Vasquez
An Opened Orange Colored Lock Standing Out From Locked Green Colored Locks on Green Background Directly Above View. (Getty Images) Hackers find 15,000 credentials by scanning for git configuration The credentials are likely for future phishing and spam campaigns, Sysdig researchers said. Oct 30, 2024 By Christian Vasquez
Fortinet office in Burnaby, BC, Canada, July 7, 2023. (Getty Images) Fortinet warns of active campaign exploiting bug in FortiManager products At least 50 organizations have been hit by the campaign, Fortinet and Mandiant say, and federal agencies are on the hook to patch. Oct 24, 2024 By Christian Vasquez
Maintenance, repair, under construction in computer system from virus or ransomware concept. Close up yellow triangle emergency warning sign on keyboard computer background with copy space. (Getty Images) Researchers out new Qilin ransomware-as-a-service variant The Qilin ransomware operation first emerged in July 2022 after rebranding a previous variant known as Agenda and rewriting the malware in Rust. Oct 24, 2024 By Christian Vasquez
PARIS, FRANCE – JUNE 04: In this photo illustration the GitHub logo is seen on the screen of an iPhone in front of a computer screen showing a Microsoft logo on June 04, 2018 in Paris, France. (Photo Illustration by Chesnot/Getty Images) GitHub patches critical vulnerability in its Enterprise Servers The “severe” flaw could allow attackers full access to instances. Oct 16, 2024 By Christian Vasquez
LONDON,ENGLAND – MARCH 21: (Editors note: The email address has been pixelated) In this photo illustration a spam ‘Phishing’ email is displayed on a laptop screen on March 21,2022 in London,England. (Photo by Peter Dazeley/Getty Images) Here’s how attackers are getting around phishing defenses Data from Egress looks at how hackers are successfully evading email security filters. Oct 16, 2024 By Christian Vasquez
Cyber, internet security and privacy concept. (Getty Images) Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds Ex-National Cyber Director Inglis says “quantitative data” in Secure Code Warrior’s report shows the importance of the cybersecurity practice. Oct 15, 2024 By Christian Vasquez