A malware campaign that used dozens of fake Facebook profiles and target Libyans has been uncovered and dismantled.
A certificate flooding attack on OpenPGP keyservers is causing problems and raising questions about the system's resilience.
A public exploit for BlueKeep has not yet been released, but a number of researchers have developed proofs-of-concept exploiting the Remote Desktop Protocol (RDP) vulnerability. Time may be running out for organizations that have still not applied Microsoft's patch.
Google is bringing Chronicle back home and will integrate the enterprise security startup into its Google Cloud security portfolio. Whether VirusTotal will remain as a stand-alone service is currently unknown.
Recent campaigns using the GreenFlash Sundown and Spelevo exploit kits have served as reminders that these kits are still active and dangerous, despite a dip in usage recently.
The Silexbot malware is compromising IoT devices and destroying their file systems and rebooting them, in an apparent attempt to stop botnet controllers from owning them.
The “general availability” of Google’s Public DNS-over-HTTPS service brings us closer to a world where all online communications, including DNS requesoverare encrypted by default.
Dennis Fisher speaks with Michael Coates of Altitude Networks about his security philosophy and the challenge of protecting hundreds of millions of users at Mozilla and Twitter.
At AWS re:Inforce, Amazon introduced two new security tools--Control Tower and Security Hub--to help ease the process of securely configuring AWS environments.
As chip-based payment cards become the norm, criminals are shifting tactics to use shimmers rather than skimmers to steal money from automated teller machines, Flashpoint said.
The DASHBOARD Act, introduced in the Senate Monday, would require social media companies to tell people what the economic value of their personal data is.
The United States Department of Homeland Security warned that Iranian nation-state attackers could lob malware capable of wiping hard drives and physically destroying machines against U.S. targets as the two countries remain locked in a political game of one-upmanship.
Dell has fixed a serious bug in the SupportAssist utility that is preinstalled on millions of PCs and could give an attacker control of a target machine.
A new vulnerability in Firefox has been used in targeted attacks, one of which has delivered the Netwire OS X malware.
Phishing is a numbers game—and the longer a kit remains hidden and active, the longer the attack can run and net more victims. The developers behind popular phishing kits are adopting best practices from the business world to streamline operations and make money.