Security News > 2018 > May

Proof-of-concept fits in a Tweet and can take down all of RH's best bits Red Hat has announced a critical vulnerability in its DHCP client and while it doesn't have a brand name it does have a...

Report claims former intel worker believed to be behind data dump A former CIA employee has been named as the prime suspect behind last year's leak of thousands of top-secret documents on the...

Report claims former intel worker behind data dump A former CIA employee has been named as the prime suspect in last year's dump of thousands of documents on the agency's hacking practices.…

Researchers have discovered a set of custom surveillanceware tools being deployed against Android and iOS devices primarily in the Middle East.

Sources said the funds were diverted to fraudulent accounts in a coordinated heist that involved hundreds of wire transfers and on-the-ground accomplices.

A Google security researcher has discovered a critical remote command injection vulnerability in the DHCP client implementation of Red Hat Linux and its derivatives like Fedora operating system....

WikiLeaks vows to take action over libelous claims The government of Ecuador spent nearly $5m to provide protected internet access to asylum-seeker Julian Assange and he responded by hacking theur...

“Oh, East is East, and West is West, and never the twain shall meet …” When Rudyard Kipling wrote that opening line to “The Ballad of East and West,” little could he have known it might one day...

State of the Internet | Security Report: Q4 2017 Findings

Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed organizations. This is clear...