HP printer issue on Mac: What happened?
Apple holds the keys to nearly all recent Mac software. This is a story of those keys, and how a...
Apple holds the keys to nearly all recent Mac software. This is a story of those keys, and how a...
The United States Healthcare providers have been alerted to vary of Trickbot and ransomware attacks by their Homeland Security department....
In a recent cybersecurity incident, the U.S. government issued a statement claiming that state-sponsored Russian hackers attacked the U.S. agencies...
A couple of days back the FBI and two federal agencies, the Department of Homeland Security and the Department of...
Widevine is a Google-owned DRM system that's in use by many popular streaming services (Netflix, Spotify, etc.) to prevent media...
A new tool for collecting RDP, web and VNC screenshots all in one place This tool is still a work-in-progress...
What’s up? As if October 2020 hasn’t been scary enough, Rapid7 Labs, the SANS Internet Storm Center (ISC), and other...
In our most recent episode of Security Nation, we spoke with Maria Barsallo Lynch, Executive Director of the Defending Digital...
Spooky season is in full swing, and we’re not just talking about Halloween. Security vulnerabilities can range from tiny errors...
Emotet, one of cybersecurity’s most-feared malware threats, got a superficial facelift this week, hiding itself within a fake Microsoft Office...
This post was authored by Jérôme Segura with contributions from Hossein Jazi, Hasherezade and Marcelo Rivero. In recent weeks, we’ve...
It can be a very convincing trick… “You can check the number in your display online sir. You’ll see I’m...
Finland: Hackers have stolen data from the Vastaamo Psychotherapy Center. Folders with personal information of tens of thousands of Suomi...
Energy Company Enel Group has yet again been hit by malware, making it a second this year. The energy...
News overview Q3 was relatively calm from a DDoS perspective. There were no headline innovations, although cybercriminals did continue to...
A curated list of Android Security materials and resources For Pentesters and Bug Hunters.BlogAAPG - Android application penetration testing guide...
A project to get a Linux shell running on iOS, using usermode x86 emulation and syscall translation. For the current...
We know that proving the efficacy of your vulnerability management program is no easy task. But with the Goals and...
A ransomware gang has made headlines for donating a big chunk of stolen funds to two charities. Two separate donations...
Businesses have increasingly adopted IoT devices, especially amid the COVID-19 pandemic to keep their operations safe. Over the past year,...
Cyberattacks during the Covid-19 pandemic exposed the flawed systems of cybersecurity. We should glance at these attacks and learn new...
In autumn, experts recorded mass registration of domain names with the names of well-known brands in the .RU zoneSpecialists at...
A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan the contents...
TASER (Testing And SEecurity Resource) is a Python resource library used to simplify the process of creating offensive security tooling,...