Ransomware threats continue to evolve at an accelerated rate, according to security researchers
Veteran threat actor group Cloud Atlas boosts favoured tactics, tools and procedures by introducing polymorphic components that hinder detection
Researchers have revealed a dedicated "sextortion" scam botnet targeting more than 200 million compromised accounts
Attackers able to manipulate IP cameras and IoT devices such as smart lighting with ease by abusing network protocols - attacks successfully demonstrated.
UK government delays decision on allowing Huawei to set up 5G network, but pledges to tighten up cyber-security in telecoms sector
Researchers detail file-leaking API vulnerability in Lenovo-EMC Iomega external Hard Drives
Researchers reveal serious vulnerability in Zoom video conferencing app, which could allow websites hijack Mac cameras
Hackers wanted to use the information stolen from PCM to perpetrate gift card fraud in a scheme similar to what happened at Wipro
A new research survey claims that humans are still in the driving seat of vulnerability research when compared to ML/AI tools - AI yet to claim a bug-bounty
A method of exploiting Google Calendar alerts is spreading fast, according to experts. Maintaining caution even when dealing with trusted apps is essential. Automation is not your friend in cases such as this.