Researchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2.
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls.
Three separate proof-of-concepts on Bash, Python and Ruby posted to outsmart fix issued last year to remedy pre-auth RCE bug.
Researchers identified serious flaws in Qualcomm’s Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets.
Legacy applications don’t support modern authentication — and cybercriminals know this.
An inside look at how nation-states use social media to influence, confuse and divide — and why cybersecurity researchers should be involved.
The consumer-electronics giant had suffered partial outages across its U.S. website and internal systems reportedly, thanks to the Maze gang.
Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.
The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising.