User-friendly protocol that backs up WebAuthn credentials announced
The University of Surrey and Yubico, the leading provider of hardware authentication security keys, have proposed a new web protocol that should...
The University of Surrey and Yubico, the leading provider of hardware authentication security keys, have proposed a new web protocol that should...
Last month, UK delivery management company, Whistl suffered a data breach from a cyber attack. UK residents may be quick...
As reports of cyber attacks via vulnerable software are rampant, building security early on into your software development lifecycle becomes...
Researchers have discovered multiple vulnerabilities in Ethereum cryptocurrency this month that when exploited by attackers can have devastating consequences. These...
Avaddon ransomware hits American Bank Systems Inc. American Bank Systems (ABS), a company that provides services to U.S. financial institutions...
SaltStack has publicly disclosed 3 vulnerabilities that had been impacting Salt instances for some time. Two of these have been...
There is an abundance of Mirai-based botnets in the wild however “Moobot”, which targets vulnerable Docker APIs, recently showed up...
Bug bounty platforms have filled a genuine need by connecting security researchers and pen-testers with products vendors in a manner...
A privilege escalation vulnerability had been lurking in the Linux kernel all this time until being discovered by a Palo...
In the U.S., Cyber Security Awareness Month (NCSAM) is observed in the month of October. This is the time to...