Security News

A security researcher working with Google Project Zero has discovered a novel bug class that impacts Windows and some of its drivers. read more

Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.

The mobile app, dubbed a "Yelp for Conservatives," was found with an open API leaking reams of user data.

Check Point Research has uncovered two massive mobile adware and data stealing campaigns, which have already had over 250 million downloads combined globally. Both target mobiles using Android,...

Coinhive has once again led Check Point’s Global Threat Index for the 15th consecutive month, despite the announcement that its services have been shut down from March 8th 2019. GandCrab...

IRIDIUM is an APT that uses proprietary techniques to bypass two-factor authentication for critical applications, according to security firm Resecurity.

To what extent do users’ opinions about threat severity expressed online align with expert judgments and can these opinions provide an early indicator to help prioritize threats based on their...

Security researchers have finally, with "high confidence," linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT...

As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things. Two new vulnerabilities have been unocovered...

Researchers have discovered a flaw in some PDF document viewers that allows new content to be added to documents without breaking the electronic signatures.