ESET researchers discover a new backdoor used by Turla to exfiltrate stolen documents to Dropbox
Without ever setting foot in the lab, a threat actor could dupe DNA researchers into creating pathogens, according to a study describing "an end-to-end cyber-biological attack"
Are mobile payments and digital wallets safe? Are the apps safer than credit cards? What are the main risks? Here’s what to know.
Is your smart doorbell putting you at risk of cyberattacks? – Spotify accounts hijacked en masse – Staying safe from SIM swapping
The operation was carried out against fraudsters trying to monetize stolen credit card data on the internet’s seedy underbelly
The U.S. law enforcement agency shares a sampling of more than 90 spoofed FBI-related domains registered recently
Here’s what to know about attacks where a fraudster has your number, literally and otherwise
This won't be music to your ears – researchers spot an unsecured database replete with records used for an account hijacking spree
The peace of mind that comes with connected home security gear may be false – your smart doorbell may make an inviting target for unwanted visitors
Lazarus takes aim at South Korea via an unusual supply-chain attack – The harsh reality of poor passwords – Bumble bitten by bugs
From the impact of the pandemic on cybersecurity careers to workers’ job satisfaction, the report offers a number of interesting findings
They’re supremely easy to remember, as well as easy to crack. Here’s how to improve your password security.
The information at risk of theft due to API flaws included people’s pictures, locations, dating preferences and Facebook data
ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software
ESET research uncovers a backdoor targeting POS systems – Why you shouldn't share your Netflix password – Data of millions of hotel guests exposed
Looking for vulnerabilities, securing systems or dismantling them, these are all viable career paths in the cybersecurity industry. Could one of them be right for you?
The last three weeks have seen a bumper crop of patches for zero-day bugs across software from Google, Apple and Microsoft
Backdoor authors show deep knowledge of the targeted POS software, decrypting database passwords from Windows registry values
The second Tuesday of the month brings another fresh batch of fixes for security vulnerabilities in various Microsoft products
Sharing is caring – except when it isn’t. Here’s why you shouldn’t share your password for online media services with other people.