Zoom isn’t the only video conferencing service attracting scrutiny from security researchers. Microsoft Teams, the technology giant’s professional collaboration tool, included a software bug that could have made…
In recent months, attackers have increased their use of programs that run on Internet-facing servers as a way to remotely control compromised systems and networks, according to security…
Internet scammers are conducting the kind of business that would probably get them in trouble with the inhabitants of the Continental Hotel. Tens of thousands of internet users in…
One of the more important topics in web application security is the same origin policy. It is a browser-based defense mechanism that makes it so that certain conditions…
list of vulnerability databasesvulnerability database use cases List of Vulnerability Databases There are a number of vulnerability databases out there. Here’s a list of some/most of the main…
In a statement today, Apple said it “thoroughly investigated” a recent report about hackers exploiting three iOS vulnerabilities but “found no evidence they were used against customers.” Apple’s…
Hackers taking part in HackerOne’s first ever virtual live hacking event donated $5K in bug bounties to the World Health Organization’s COVID-19 Solidarity Fund. The generous gesture was…
When it comes to strengthening the current cybersecurity practices employed in organizations today, one of the most significant steps that security teams can take is to amalgamate modern…
Cybersecurity researchers have spotted a new variant of the Snatch ransomware that first reboots infected Windows computers into Safe Mode and only then encrypts victims’ files to avoid…
A new variant of Vega ransomware family, dubbed Zeppelin, has recently been spotted in the wild targeting technology and healthcare companies across Europe, the United States, and Canada. However,…