The login scheme promises it won’t share data — and will be required for all developers using third-party sign-ins.
Is ‘Sign in with Apple’ Marketing Spin or Privacy Magic? Experts Weigh In
The Russian-speaking APT acts as a support group for high-profile APTs like Sofacy and BlackEnergy.
Zebrocy: A Russian APT Specializing in Victim Profiling, Access
During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation state cyber weapons.
AI Isn’t Good Enough When Lives Are on the L […]
At Infosecurity Europe, a security expert from Guardicore discusses a new cryptomining malware campaign called Nanshou and why the cryptojacking threat is set to get worse.
Infosecurity Europe: Cryptojacking is […]
Researchers use malicious NFC tags and booby-trapped physical surfaces to connect Android devices to malicious wireless networks.
Tap ‘n Ghost Attack Creatively Targets Android Devices
Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.
Malware Payloads Hide in Images: Steganography Gets a Reboot
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.
Bugs in Grandstream Gear Lay Open SMBs […]
The attack appears to be associated with a China-backed APT actor.
Some ASUS Updates Drop Backdoors on PCs in ‘Operation ShadowHammer’
The contractor with whom it shared the data has a vulnerable, unpatched network.
FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors
Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.
Firefox and Edge Fall to Hackers on Day Two of Pwn2Own
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.
Google Play Touts Certs in Quest For […]
Users of the open-source project should upgrade immediately.
Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project
Hacked drones are breaching physical and cyberdefenses to cause disruption and steal data, experts warn.
Drones are Quickly Becoming a Cybersecurity Nightmare
- Load More