Positive Technologies has elaborated on a critical remote code execution vulnerability its researchers discovered in the web interface of the Cisco Systems Access Control Server (ACS).
Security researchers are reporting a phishing attack technique which hackers may be using in the wild, and could put websites at risk of attack.
The botnet operators behind IcedID and Trickbot are collaborating with each other and possibly sharing their ill-gotten gains, according to security researchers.
Security researchers have uncovered several security vulnerabilities in blockchain platform EOS, some of which can be exploited by hackers to remotely execute arbitrary code on EOS nodes.
Open Bug Bounty has added a free service that will allow organisations to create their own bug bounty programme.
Vulnerability patched in Git source code versioning software. Security researchers have discovered a number of flaws in Git that could have enabled hackers to run remote code on a victim's PC.
Banking hacking group Cobalt continues to operate despite the arrest of a leading figure recently, according to researchers.
Security researchers at Tencent's Keen Security Lab have revealed that Internet-connected systems in several BMW cars feature vulnerabilities that allow malicious actors to hack into such vehicles via a set of remote attack surfaces.
Researchers from Cornell Tech, NYU, Technion, Cornell University, and Hunter College conducted what was described as the first large-scale study of apps used by stalkers to track their intimate partners.
Increasing value of cryptocurrency sees hackers look out for mining hardware. Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs.
A group of European security researchers readied the release of a paper for early 15 May detailing vulnerabilities in PGP/GPG and S/MIME email encryption that could reveal the plaintext of encrypted emails.
Security researchers recently discovered the presence of 38 malicious apps on the Google Play Store that were not only disguised as games and education apps but also redirected victims to install other apps from the Play Store.
Security researchers have discovered a new form of the Hide and Seek IoT malware. The latest version can now survive a reboot of the infected device.
Armor for Android resurfaces as Android's Antivirus. A fake anti-virus app has re-emerged on Android devices, according to security researchers.
Researchers have discovered a versatile cryptominer worm that propagates itself by exploiting vulnerabilities in Microsoft's SMBv1 server, Oracle's WebLogic Server and Apache Struts.
Tenable Security researchers have revealed a Zero Day flaw in two Schneider Electric industrial controllers that if exploited could give an attacker an attack the ability to remotely execute code with high privileges.
Critical vulnerability allows attackers to bypass authentication. Security researchers have found flaws in fibre-optic broadband routers that enable hackers to bypass security and takeover devices.
A previously unidentified remote access tool (RAT) primarily targeting Indian organisations uses seven different techniques for sniffing out researchers' virtual machines and sandbox environments.
Security researchers have found a flaw in Windows that could allow hackers to crash a system when they insert a USB stick with specially crafted code. The problem happens even when Windows is locked.
Checkmarx security researchers developed a proof of concept attack that would allow and enable an Amazon Echo to continue recording a user long after a request is made.
F-Secure finds millions of hotel rooms at risk from hackers. The key card given out by hotels to guests to access their rooms may not be as secure as thought.
Update: Russian hacker TheBottle investigated by Palo Alto's Unit 42 researchers whic identified a new botnet malware family SquirtDanger described as "Swiss Army Knife Malware".
A new attack group - Orangeworm - targeting the healthcare sector and related industries has been spotted by security researchers from Symantec.
Botnet uses compromised systems to spread infection. Security researchers have discovered a large botnet that is using a severe flaw in the Drupal CMS in order to infect other systems.
Two Italian researchers from the University of Padua have compiled an estimate of how much money, in bitcoin, has been generated by the various types of ransomware used by cyber-criminals.
Academic researchers have discovered that brain implants, known as neurostimulators, can be hacked and could prevent patients from "speaking or moving, cause irreversible damage to his brain, or even worse, be life-threatening".
Researchers at Cybereason have been analysing a complex network honeypot operation, and the results should make every CISO pause for thought.
Security researchers observed a noticeable spurt in the activities of advanced persistent threat (APT) groups based in certain parts of Asia and in the Middle East during the first three months of the year.
US Homeland Security warned Russian state actors behind attacks on US energy grid. Security researchers have warned that hackers are using badly-configured Cisco switches to gain entry into the infrastructure of organisations.
Facebook's recent announcement to update its data restriction policies has prompted some researchers to examine other social media platforms to review their data practices as well.