One of the bugs, which affects macOS as well as older versions of iPhones, could allow an attacker to execute arbitrary code with kernel privileges.
After news of REvil’s rip-off-the-affiliates backdoor & double chats, affiliates fumed, reiterating prior claims against the gang in “Hackers Court.”
A high-severity vulnerability could cause system crashes, knocking out sensors, medical equipment and more.
Casey Ellis, founder, CTO and chairman of Bugcrowd, discusses a roadmap for lowering risk from cyberattacks most effectively.
A custom “SparrowDoor” backdoor has allowed the attackers to collect data from targets around the globe.
Digital privacy rights defenders contend that geofencing warrants grab data on everyone near a crime, without cause.
Once available only to the cybersecurity community, Acronis has opened its bug-hunting program to the public and aims to double the total bounties paid.
Domain names are often brands’ most valuable and impersonated assets. Learn how Brand Monitor by WhoisXML API supports brand protection.
Discovery of BulletProofLink—which provides phishing kits, email templates, hosting and other tools—sheds light on how wannabe cybercriminals can get into the business.
It’s the second agricultural business to be seized this week and portends a bitter harvest with yet another nasty jab at critical infrastructure.