Security News

A team of security researchers has exploited Microsoft’s patchy macro documentation to hide malicious code inside innocent-looking macros.

An extremely stealthy Microsoft Exchange backdoor can read, modify or block emails going through the compromised mail server and even compose and send new emails. LightNeuron – as the backdoor has...

It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In one notorious case, a...

Short on concrete details but long on affirming cybersecurity skills as a critical piece of federal defense, the White House executive order aims to bolster the national cyber workforce.

Nik Cubrilovic Must Pay GoGet, Do Community ServiceAn Australian security researcher who pleaded guilty to several charges related to probing the network of popular car-sharing service GoGet has...

Southwest Research Institute has developed a cybersecurity system to test for vulnerabilities in automated vehicles and other technologies that use GPS receivers for positioning, navigation and...

A bug in the popular anti-piracy framework allows a side-channel attack on premium content.

Vulnerabilities Found in Security Cameras, Baby Monitors and MoreAn independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that...

A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina State University and the...

Attackers looking to compromise Oracle WebLogic servers for their own needs have a new zero-day RCE flaw at their disposal. “Oracle WebLogic wls9_async and wls-wsat components trigger...