Jan 17, 2024NewsroomVulnerability / Software Security
GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be...
Jan 17, 2024NewsroomSpyware / Forensic Analysis
Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS...
Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar
In the digital age, the battleground for security professionals is not only evolving, it's expanding...
Jan 17, 2024NewsroomFinancial Data / Vulnerability
The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be...
Jan 18, 2024NewsroomCyber Espionage / Threat Intelligence High-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza,...
Jan 18, 2024NewsroomFirmware Security / Vulnerability
Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of...
Jan 18, 2024The Hacker NewsAuthentication Security / Passwords
In today's digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide...