Editor's Pick

Beyond Root: Custom Firmware for Embedded Mobile Chips

In this DEFCON presentation, Christopher Wade shows us his methods for extracting, analysing, and abusing a Samsung bootloader to create custom firmware for his mobile phone.

Latest news

Free Tool Helps Security Teams Measure Their API Attack Surface

Data Theorem's free API Attack Surface Calculator helps security teams understand potential API exposures.

Dark Reading | 2 hours ago
SquirrelWaffle Loader Malspams, Packing Qakbot, Cobalt Strike

Say hello to what could be the next big spam player: SquirrelWaffle, which is spreading with increasing frequency via spam campaigns and infecting...

Threatpost | 2 hours ago
North Korea's Lazarus Group Turns to Supply Chain Attacks

State-backed group is among a growing number of threat actors looking at supply chain companies as an entry point into enterprise networks.

Dark Reading | 3 hours ago
Ready to Play? Squid Game Becomes an Attractive Lure to Spread Cyberthreats

Following demand from viewers, cybercriminals are not shy in taking advantage of fans’ eagerness to watch the show, with well-known fraud schemes h...

Dark Reading | 3 hours ago
Public Clouds & Shared Responsibility: Lessons from Vulnerability Disclosure

Much is made of shared responsibility for cloud security. But Oliver Tavakoli, CTO at Vectra AI, notes there's no guarantee that Azure or AWS are...

Threatpost | 4 hours ago
IBM Announces Advances and New Collaborations in AI-Powered Automation, 5G Connectivity and Security at Mobile World Congress Los Angeles

IBM collaborates with Boston Dynamics, Cisco, Palo Alto Networks and Turnium Technology Group to help equip businesses in next phase of digital...

Dark Reading | 4 hours ago
CISA Announces Appointment of Washington Secretary of State Kim Wyman as Senior Election Security Lead

As an expert on elections, her appointment speaks to the Agency’s dedication to working with election officials throughout the nation in a n...

Dark Reading | 4 hours ago
Gas Stations in Iran Downed by Cyberattack

Unknown attackers hijacked gasoline pump machines and defaced them with a message that reportedly included a phone number for Supreme Leader...

Dark Reading | 4 hours ago
Cybersecurity Talent Gap Narrows as Workforce Grows

Job satisfaction and salaries have both increased for cybersecurity professionals, as younger workers seek specific training to prepare for a...

Dark Reading | 5 hours ago
Lazarus Attackers Turn to the IT Supply Chain

Kaspersky researchers saw The North Korean state APT use a new variant of the BlindingCan RAT to breach a Latvian IT vendor and then a South...

Threatpost | 5 hours ago
Why the Next-Generation of Application Security Is Needed

New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security...

Threatpost | 7 hours ago
DoJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation

Operation Dark HunTor targeted opioid traffickers on the DarkNet, leading to the seizure of weapons, drugs, and $31 million.

Dark Reading | 7 hours ago
FBI Raids Chinese Point-of-Sale Giant PAX Technology

U.S. federal investigators today raided the U.S. offices of PAX Technology, a Chinese provider of point-of-sale devices used by millions of...

Krebs on Security | 7 hours ago
Are Baby Boomers More Vulnerable Online Than Younger Generations? You Might Be Surprised

Growing up with computers and the Internet doesn't necessarily convey all the advantages often attributed to younger users.

Dark Reading | 8 hours ago
Attackers Hijack Craigslist Emails to Bypass Security, Deliver Malware

Manipulated Craigslist emails that abuse Microsoft OneDrive warn users that their ads contain ‘inappropriate content.”

Threatpost | 8 hours ago
Mozilla Firefox Blocks Malicious Add-Ons Installed by 455K Users

The misbehaving Firefox add-ons were misusing an API that controls how Firefox connects to the internet.

Threatpost | 9 hours ago
Pulling Back the Curtain on Bug Bounties

It's critical that infosec professionals and consumers understand threats and vulnerabilities, but they are being kept in the dark.

Dark Reading | 11 hours ago
Millions of Android Users Scammed in SMS Fraud Driven by Tik-Tok Ads

UltimaSMS leverages at least 151 apps that have been downloaded collectively more than 10 million times, to extort money through a fake premium...

Threatpost | 13 hours ago
Wardrivers Can Still Easily Crack 70% of Wi-Fi Passwords

Weaknesses in the current Wi-Fi standard and poorly chosen passwords allowed one wardriver to recover 70% of wireless network passwords.

Dark Reading | 13 hours ago
OpenText Strengthens Ransomware Resilience

New detection and alert functions within Carbonite Server increase data protection against ransomware.

Dark Reading | a day ago
Forcepoint Completes Acquisition of Bitglass

The acquisition of Bitglass will be the third technology acquisition for Forcepoint this year.

Dark Reading | a day ago
Jumio Launches End-to-end Orchestration for its KYX Platform

Platform combines digital identity proofing, compliance verification and anti-money laundering checks.

Dark Reading | a day ago
SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat

Microsoft says the group has attacked more than 140 service providers and compromised 14 of them between May and October of this year.

Dark Reading | a day ago
Defending Assets You Don’t Know About, Against Cyberattacks

No security defense is perfect, and shadow IT means no company can inventory every single asset that it has. David “moose” Wolpoff, CTO at Ran...

Threatpost | a day ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.