Security News

A recently disclosed attack on Chilean interbank network Redbanc appears linked to notorious North Korean hacking group Lazarus, Flashpoint reports. read more

Researchers at IoT security company ForeScout have created a piece of malware to demonstrate how malicious actors could remotely hack into smart buildings. read more

Researchers can earn up to $300,000 and a car if they manage to hack a Tesla Model 3 at this year’s Pwn2Own competition, Trend Micro’s Zero Day Initiative (ZDI) announced on Monday. read more

He said that similar flaws were also found in the Dreamhost, HostGator, OVH and iPage web hosting platforms.

The U.S. Defense Department and bug bounty platform HackerOne on Thursday announced the results of Hack the Air Force 3.0. read more

McAfee released its McAfee Labs Threats Report: December 2018, examining activity in the cybercriminal underground and the evolution of cyber threats in Q3 2018. McAfee Labs saw an average of 480...

7,000 Twitter Amplification Bots Found in One Day's Search read more

ESET security researchers have discovered 12 new OpenSSH backdoor families that haven’t been documented before. read more

Convincing Face-Swapping Clips Easy to Create With Gaming Laptops and Free ToolsThe easy availability of tools for designing face-swapping deep-fake videos drove Symantec security researchers...

Researchers have created new artificial intelligence that could spell the end for one of the most widely used website security systems. The new algorithm, based on deep learning methods, is the...