Security News > 2018 > July

A new remote access Trojan that abuses the Telegram messaging protocol on Android devices can give attackers total control over your device. Here's how to stay safe.

This update brings a fresh new look to the site, but also gives us a better platform overall, built and designed from the ground up for the future.

More companies are looking to adopt "safe harbor" language in their bug bounty programs to build trust with participants.

Security researchers at Microsoft have unveiled details of two critical and important zero-day vulnerabilities that had recently been discovered after someone uploaded a malicious PDF file to...

A look at the underground cybercrime landscape in 2018 shows a dynamic and quick-reacting community in the face of a successful crackdowns by law enforcement.

Here is a look at what exploit kits, CVEs and other web-based threats are keeping security professionals working overtime in 2018.

Distributed Denial of Service attacks maybe one of the oldest tools in a hacker’s toolbox, but that doesn’t mean they haven’t fallen out of fashion.

Mickos sat down with Threatpost's Lindsey O'Donnell to talk about bug bounty program opportunities, challenges, and ultimately how programs are evolving.

Rapid7's Tod Beardsley Says Many Inappropriate Protocols Remain ExposedOld technology never dies, but rather fades "very slowly" away, as evidenced by there being 21 million FTP servers still in...

But No Signs Hackers Yet Have AI, Says Cybereason's Ross RusticiSecurity experts warn that hackers could one day make use of machine learning and AI to make their attacks more effective....