Researchers identified serious flaws in Qualcomm’s Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets.
Legacy applications don't support modern authentication -- and cybercriminals know this.
Fully opening the door to allow people to contribute to – and notably, tinker with – the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt.
Chipmaker investigates a leak of intellectual property from its partner and customer resource center.
Appropriate use of native security controls in AWS and other CSPs is fundamental to managing cloud risk and avoiding costly breaches.
An inside look at how nation-states use social media to influence, confuse and divide -- and why cybersecurity researchers should be involved.
Researchers went into detail about the discovery and disclosure of 19 security flaws they found in Mercedes-Benz vehicles, which have all been fixed.
The consumer-electronics giant has suffered partial outages across its U.S. website and internal systems reportedly, thanks to the Maze gang.
Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.
Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches.
At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.
Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.
Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.
The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.
Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.
A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.
Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.
The explosion of open-source AI models are lowering the barrier of entry for bad actors to create fake video, audio and images - and Facebook, Twitter and other platforms aren't ready.
Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.
An attacker can hide amidst legitimate traffic in the application's update function.
The First Stop For Security NewsSubscribe to Alerts feed