Security News


White hat hackers have earned $545,000 for successfully demonstrating zero-day exploits targeting products from VMware, Microsoft, Google, Apple, D-Link, and Adobe at the 2019 Tianfu Cup hacking...

After news broke that cybercriminals have started leveraging the BlueKeep vulnerability to deliver cryptocurrency miners, Microsoft has warned that the exploit will likely also be used to deliver...

A newly discovered exploit kit (EK) is being employed in live attacks despite the fact that it’s still in an unfinished state, Trend Micro’s security researchers reveal. read more

A security researcher has published proof of concept exploits for two remote code execution vulnerabilities in rConfig that haven’t been patched yet. read more

But RDP Attack Overuse Leads Other Hackers Back to Botnets, Researchers FindMany ransomware-wielding attackers continue to hack into organizations via remote desktop protocol. But some Sodinokibi...

Users of Microsoft, PayPal, DHL, and Dropbox are among the top targets of phishers, according to a new report from cloud service provider Akamai.

Social Network Accuses Pegasus Malware Maker NSO Group of Violating the LawFacebook is suing NSO Group, a commercial spyware company, alleging it developed a potent exploit to spy on WhatsApp...

A new report from IntSights details the many ways cybercriminals break into a new generation of highly digitized cars.

A security researcher has published a proof-of-concept (PoC) exploit for the recently addressed Android zero-day vulnerability that impacts Pixel 2 devices. read more