Editor's Pick

Buffer Overflow to Run Root Shell - Full Tutorial

Buffer Overflow Basics Overview Buffer overflows were an earth-shattering vulnerability exploited in the late 1980’s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced e...

Latest news

Data on Indian Mobile Payments App Reportedly Exposed via Open S3 Bucket

Over 7 million records exposed, according to vpnMentor, but app maker says there is no sign of malicious use.

Dark Reading | 8 hours ago
Apple Pays Researcher $100,000 for Critical Vulnerability

Apple has fixed a flaw in the "Sign in with Apple" feature that could have enabled attackers to break into user accounts for third-party services.

Dark Reading | 8 hours ago
26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation

Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors.

Dark Reading | 10 hours ago
Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now...

Dark Reading | 12 hours ago
Apple Pays $100K Bounty for Critical ‘Sign in With Apple’ Flaw

Apple has fixed a critical flaw in its Sign in with Apple feature, which could have been abused by attackers to takeover victims' third-party...

Threatpost | 13 hours ago
Minneapolis Police Department Hack Likely Fake, Says Researcher

Troy Hunt said that the supposed data breach perpetrated by Anonymous is most likely a hoax.

Threatpost | 14 hours ago
Hosting Provider’s Database of Crooked Customers Leaked

Database of sensitive info, including emails and passwords, from owners of Daniel’s Hosting portals could be incriminating.

Threatpost | 15 hours ago
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap

Without the right tools and with not enough cybersecurity pros to fill the void, the talent gap will continue to widen.

Dark Reading | 15 hours ago
COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

Dark Reading | 18 hours ago
Career Choice Tip: Cybercrime is Mostly Boring

When law enforcement agencies tout their latest cybercriminal arrest, the defendant is often cast as a bravado outlaw engaged in sophisticated,...

Krebs on Security | 3 days ago
Bank of America Security Incident Affects PPP Applicants

The incident occurred when Paycheck Protection Program applications were uploaded to a test platform and accidentally shared.

Dark Reading | 3 days ago
Steganography Anchors Pinpoint Attacks on Industrial Targets

Ongoing spear-phishing attacks aim at stolen Windows credentials for ICS suppliers worldwide.

Threatpost | 3 days ago
Abandoned Apps May Pose Security Risk to Mobile Devices

Mobile providers don't often update users when applications are not supported by developers, security firm says.

Dark Reading | 3 days ago
Cisco Announces Patches to SaltStack

The patches came after Cisco was notified by the Salt Open Core team that the vulnerabilities and updates were available.

Dark Reading | 3 days ago
NTT Communications Data Breach Affects Customers, Threatens Supply Chain

Attackers managed to compromise NTT Communication’s Active Directory server and a construction information management server.

Threatpost | 3 days ago
NSA Warns of Sandworm Backdoor Attacks on Mail Servers

The Russian spy group, a.k.a. BlackEnergy, is actively compromising Exim mail servers via a critical security vulnerability.

Threatpost | 3 days ago
Digital Distancing with Microsegmentation

Physical distancing has blunted a virus's impact; the same idea can be applied to computers and networks to minimize breaches, attacks, and...

Dark Reading | 3 days ago
All Links Are Safe ... Right?

Today is a perfect day for a security breach.

Dark Reading | 3 days ago
‘Hack-For-Hire’ Firms Spoof WHO To Target Google Credentials

Google TAG report reveals that "hack for hire" firms are tapping into the coronavirus pandemic via WHO phishing lures.

Threatpost | 3 days ago
Zscaler Buys Edge Networks

The acquisition is Zscaler's second major buy this quarter.

Dark Reading | 3 days ago
ACLU Sues Clearview AI Over Faceprint Collection, Sale

Watchdog group said company has violated the Illinois BIPA and ‘will end privacy as we know it’ without intervention.

Threatpost | 3 days ago
A Rogues' Gallery of MacOS Malware

MacOS isn't immune from malware. Being prepared means understanding the nature of the worst threats a security team is likely to see attacking...

Dark Reading | 4 days ago
GitHub Supply Chain Attack Uses Octopus Scanner Malware

Octopus Scanner is a new malware used to compromise 26 open source projects in a massive GitHub supply chain attack.

Dark Reading | 4 days ago
Inside the Hoaxcalls Botnet: Both Success and Failure

The DDoS group sets itself apart by using exploits -- but it doesn't always pan out.

Threatpost | 4 days ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.