A fairly new piece of ransomware has been found leveraging pen-testing/attack tools for a more targeted approach of getting installed on compromised systems, Microsoft researchers warn.
A fairly new piece of ransomware has been found leveraging pen-testing/attack tools for a more targeted approach of getting installed on compromised systems, Microsoft researchers warn.
With an increasing number of researchers displeased with the fact that it takes a lot of time to assign Common Vulnerabilities and Exposures (CVE) identifiers to their flaws, the MITRE Corporation has decided to launch a pilot program whose goal is to address the need for rapid CVE assignments.
A Bangladeshi cyber security expert has gone missing, his family said Friday, days after he said officials at the central bank bore some responsibility for an $81 million theft from its foreign exchange account.
Experts at software research firm NorthBit have developed what they believe to be a reliable exploit for a Stagefright vulnerability affecting Google’s Android operating system.
What does a CISO look like? You may think that's a tough question--and it is. But the folks at cybersecurity firm Digital Guardian have done some research and profiled the typical CISO at a Fortune 100 enterprise.
Pwn2Own 2016 has come to an end, with researchers earning a total of $460,000 in cash for disclosing 21 new vulnerabilities in Windows, OS X, Flash, Safari, Edge and Chrome.
Researchers at Trend Micro have been monitoring a business email compromise (BEC) campaign aimed at companies from all around the world.
“…is part of this balanced breakfast…”
This is the claim of many sugary cereals aimed directly at children. It is also the claim of many vendors in the software security market.