Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
ICO hits British Airways with a record-breaking £183 million fine for last year’s data breach that compromised the personal data of half a million customers. → Read More
A new malware dubbed Silex has bricked at least 2000 IoT devices in an ongoing campaign that is expected to intensify in the coming days. → Read More
A vulnerability in Dell’s SupportAssist software, a software designed to protect users from vulnerabilities, has left millions of PC’s vulnerable to remote takeover. → Read More
Cyber criminals are storing malicious content, including malware and C2 servers, on Microsoft’s Azure cloud services. → Read More
A sophisticated malware campaign dubbed “HiddenWasp” is targeting Linux systems with the goal of targeted remote control. → Read More
IBM X factor researchers detected an uptick in HawkEye version 9 keylogger infection campaigns targeting business around the world. → Read More
TThe proliferation of BYOD and portable media devices is increasing the cybercrime attack surface exponentially. TechAdvisory.org reports that 25 percent → Read More
A threat actor by the alias “Boris Bullet-Dodger” broke into the database of a company that provides license plate readers for the U.S. government to use → Read More
Google’s Chronicle Security team discovered a Linux version of the Winnti malware was used in the 2015 hack of a Vietnamese Gaming company. → Read More
Palo Alto Networks Unit 42 researchers have actively monitored the evolution of SilverTerrier Nigerian Business Email Compromise (BEC) threat actors. The → Read More
Drupal core released a patch for a moderately critical vulnerability in third party libraries that could allow the by-passing of protection of Phar Steam Wrapper Interceptor. → Read More
Intuit the company behind tax preparation software TurboTax alerted users their accounts may have been accessed by an unauthorized party. → Read More
Government IT systems and critical infrastructure systems around the world are at risk due to legacy technology and its keepers pending retirements. → Read More
The year-end report from Bugcrowd found the top three reasons for bug hunting were for the challenge, professional development, and education. → Read More
An ElasticSearch server database containing the information of nearly 57 million U.S. residents was found to have been left exposed without a password. On → Read More
Check Point Researchers developed an attack to hijack DJI drone user accounts which may contain the user’s sensitive information as well as access to the device itself. → Read More
An independent researcher who was disgruntled with traditional bug bounty methods took it upon himself to leak the details of an exploit in Oracle’s → Read More
Sony TV’s can be remotely exploited without any authentication by attackers due to three vulnerabilities spotted by Fortinet researchers, with one of the → Read More
The information security firm and exploit vendor Zerodium announced a vulnerability in the Tor browser that could allow an attacker to execute malicious → Read More
Bugcrowd crowdsourcing platform last week launched a free educational platform for security researchers called Bugcrowd University. → Read More