Recently, we’ve been noticing ever more dubious advertising libraries in popular apps on Google Play. The monetization methods used in such SDKs can pose a threat to users, yet they pull in more revenue for developers than whitelisted ad modules due to the greater number of views. In this post we will look into a…
Even seeing data breaches in the news, more than half of consumers are still reusing passwords.
A lack of awareness about where and how open-source libraries are being used is problematic, researchers say.
Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign.
The meal-kit company’s customer records were leaked as part of the Shiny Hunters breach.
An investigation traces an NSO Group-controlled IP address to a fake Facebook security portal.
Government and air transportation companies in Kuwait and Saudi Arabia were targeted in a recent attack tracked back to the Chafer APT.
Looking for niche anomalies in an automated way with AI and machine learning is the future.
Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.