Vulnerability in open source project has since been patched | Continue reading
Worldwide law enforcement operation targets online crime surge | Continue reading
‘Phoenix’ group laid low following seizure of computing equipment and stolen devices | Continue reading
‘It’s like you’re recapitulating the worst IE browser extensions and installing them by default’, grumbles one user | Continue reading
Organization said it suffered ‘unauthorized access’ to systems | Continue reading
White paper systematically examines the attack while showcasing a ‘laundry list’ of new flaws | Continue reading
Bugs deemed ‘very easy to exploit as they require no prerequisites’ | Continue reading
True Health New Mexico was hit by a cyber-attack in October | Continue reading
Report states diversity and inclusion within the industry is lagging behind | Continue reading
Report from cybersecurity firm Kaspersky reveals worrying attitudes towards spyware usage | Continue reading
Browser goes further to protect against bugs by disabling JIT | Continue reading
Now-patched API vulnerability allowed attacker to access sensitive resources | Continue reading
Audio-based social media platform prioritizes access control bypasses and information disclosure flaws | Continue reading
Audio-based social media platform prioritizes access control bypasses and information disclosure flaws | Continue reading
‘Chrome’s NTP only has a really weak CSP that doesn’t mitigate XSS’ | Continue reading
Proposed replacement for /dev/random promises to double performance and add flexibility | Continue reading
‘Belarus Cyber-Partisans’ say they gained access to all entries in and out of the country over the past 15 years | Continue reading
New approach echoes the depressingly successful ransomware-as-a-service business model | Continue reading
Researchers’ bid to reproduce ProxyShell yields something entirely new | Continue reading
Evasive malware is being spread via email in campaigns similar to those of nation-state actors | Continue reading
‘His vision has changed the lives of hundreds of thousands of security practitioners’ | Continue reading
Follow-up to recent GoCD disclosure provides additional path to infiltrating build environments | Continue reading
Researchers urge developers to secure code by disallowing non-ASCII characters | Continue reading
Individuals face up to 145 years in prison if convicted | Continue reading
French team takes home nearly $200k in winnings as event uncovers 61 zero days | Continue reading
Years-old WAF bypass flaw was discovered in June | Continue reading
Critical severity bugs disclosed by networking titan | Continue reading
‘All mobile internet networks are completely cut off,’ one journalist on the ground tells The Daily Swig | Continue reading
Sandboxing technology levels up browser security | Continue reading
Baseline standards proposed for secure development, handling vulnerabilities, and protecting sensitive data | Continue reading
Gaping OptinMonster security hole patched | Continue reading
Overall worldwide shortfall shrinks 400k to 2.7m unfilled positions | Continue reading
Fraud is still the primary goal of cybercriminals operating across the continent, Interpol warns in latest market report | Continue reading
Developer moves quickly to address vulnerabilities after his account was compromised | Continue reading
Investigations yet to confirm if any data was exfiltrated | Continue reading
Researcher questions efficacy of proposed remedies as debate rumbles on 18 months after disclosure | Continue reading
Security researchers can sign up now | Continue reading
AWS WAF and ModSecurity get ‘blinded by science’ | Continue reading
Latest specification is a work in progress | Continue reading
CEO tells (ISC)² Security Congress how orgs should rethink hiring strategies | Continue reading
We know what you DDoSed last summer | Continue reading
Global initiative ‘will definitely prevent some cyber-attacks’, says expert | Continue reading
Researchers invited to test for flaws under new YesWeHack platform | Continue reading
Violations could attract hefty fines and up to five years in prison | Continue reading
API keys are accidentally being leaked by websites. Here’s how to find them | Continue reading
Ohio Personal Privacy Act will grant Ohioans an expansive set of new rights, writes US attorney David Oberly | Continue reading
Bug was inadvertently introduced in last month’s security release | Continue reading
Back on the chain gang | Continue reading