Security News

New Surge in Activity Spotted After Four-Month AbsenceEmotet, one of the most powerful malware-spreading botnets, is active again after a four-month absence, according to several security...

In a cybersecurity study of network attached storage (NAS) systems and routers, Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industrywide...

The zero-day vulnerability could enable privilege escalation, and is not part of Google's Android September security update.

Flaws now (mostly) patched Over-the-air provisioning is the latest attack vector threatening your innocent Android mobe, according to Check Point.…

A cheaper and more efficient method for IoT devices to receive high-speed wireless connectivity has been developed by researchers at the University of Waterloo. With 75 billion Internet of Things...

Security researchers from Secureworks have analyzed several tools used by the Hexane threat actor in attack campaigns against industrial organizations over the past several months. read more

Researchers warn users of several plugins to update as vulnerabilities are being actively exploited to redirect website visitor traffic.

7 out of 10 newly registered domains (NDRs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access to them with URL...

After Valve banned him from its bug bounty program, a researcher has found a second zero-day vulnerability affecting the Steam gaming client.

You likely know to avoid suspicious emails to keep hackers from gleaning personal information from your computer. But a new study from SMU (Southern Methodist University) suggests that it’s...