Hackers are outpacing defences, new report finds
The battle between threat actors and those mounting cyber defenses designed to keep them out is a constant cat and mouse game. But new data from Crowdstrike, which releases...
Dependency confusion explained: Another risk when using open-source repositories
What is dependency confusionDependency confusion is a newly discovered logic flaw in the default way software development tools pull third-party packages from public and private repositories. Attackers can take...
Attackers Turn Struggling Software Projects Into Trojan Horses
While access to compromised systems has become an increasingly common service, some cybercriminals are going straight to the source: buying code bases and then updating the application with malicious...
One of the biggest Android VPNs hacked? Data of 21 million users from 3...
A user on a popular hacker forum is selling three databases that purportedly contain user credentials and device data stolen from three different Android VPN services – SuperVPN, GeckoVPN,...
North Korea’s Lazarus Group Expands to Stealing Defense Secrets
Several gigabytes of sensitive data stolen from one restricted network, with organizations in more than 12 countries impacted, Kaspersky says.The Lazarus Group, North Korea's advanced persistent threat (APT) actor,...
Microsoft Releases Free Tool for Hunting SolarWinds Malware
Meanwhile, researchers at SecurityScorecard say the "fileless" malware loader in the attack - Teardrop - actually dates back to 2017.Organizations investigating whether they are victims of — or are still...
Google pledges changes to AI research oversight after internal revolt
Alphabet Inc’s Google will change procedures before July for reviewing its scientists’ work, according to a town hall recording heard by Reuters, part of an effort to quell internal...
How this IMDb flaw gave me credit for working on Chernobyl, GOT, and other...
You may not know this about me, but I’m pretty famous. In 1991, I played on the short-lived, much-hated TV show Baby Talk alongside the likes of George Clooney, Tony...
61% of Malware Delivered via Cloud Apps: Report
Researchers report the majority of malware is now delivered via cloud applications - a jump from 48% last year.Most (61%) malware is now delivered via cloud applications, researchers report...
New APT Group Targets Airline Industry & Immigration
LazyScript bears similarities to some Middle Eastern groups but appears to be a distinct operation of its own, Malwarebytes says.A new threat group with some similarities to some other...