Security News
Google is expanding its vulnerability reward program again: the company wants to be notified about techniques that allow third parties to successfully bypass their abuse, fraud, and spam systems....
Phishing works no matter how hard a company tries to protect its customers or employees. Security researchers have been warning of a new phishing attack that cybercriminals and email scammers are...
A vulnerability (CVE-2018-8340) in Microsoft Active Directory Federation Services (ADFS) allows a second authentication factor for one account to be used for all other accounts in an organization,...
Vulnerability Allows a Second Factor for One Account to be Used for All Accounts in an Organization read more
This is similar to taking a room key for a building and turning it into a skeleton key that works on every door in the building.
Your Mac computer running the Apple's latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday....
Researchers released a workaround for Apple's USB Restricted Mode security feature the same day it was rolled out.
Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by...
Cybercriminals have been leveraging a technique that involves manipulating font sizes in an effort to increase the chances of their phishing emails bypassing the protections implemented by...
Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw.