GitLab to integrate Peach Tech and Fuzzit fuzz-testing into its DevOps lifecycle tool, helping developers to catch security bugs earlier…
Study finds cyber-criminals are shifting tactics to favour multi-stage ransomware attacks that include stealing sensitive data to maximise damage and…
Apple's open source Password Manager Resources project includes site-specific data aimed at improving compatibility of third-party password tools
TrickBot information-stealing malware updated with new 'nworm' module that uses encryption and in-memory execution to hinder detection efforts
Security researchers find attackers breaking into public-facing Windows IIS web servers to install Monero-mining malware across networks
Scam emails use Excel spreadsheets containing Covid-19 data as a lure, then execute malicious macros that give attackers control over…
Agency says it had to develop its own tool to access two locked iPhones used by gunman who attacked Pensacola…
Researchers warn of weaknesses affecting all Bluetooth-compliant devices – just as governments roll out coronavirus apps reliant on the tech
Hackers break into academic high-performance computing clusters in Edinburgh, Germany and Switzerland to install Monero currency-mining software
Attackers gained access to customers' websites last October, says hosting giant, but only via SSH, with 'main accounts' not affected
Attackers impersonate US self-regulatory body for brokerage firms in phishing email campaign that looks to harvest Office and SharePoint passwords
Microsoft patches security vulnerability that could have allowed attackers to take over Teams accounts and groups if users viewed a…
UK's intelligence agencies must use artificial intelligence to repel increasingly sophisticated cyber-attacks and disinformation campaigns, finds study
VictoryGate crypto-mining botnet infected at least 35,000 systems, mostly in Peru, and continues to spread via infected removable USB drives
As people around the world turn to online services during the pandemic, hackers seek profits from denial-of-service and ransomware attacks
Boston University proposal would involve tracking randomly generated IDs via short-range broadcasts as means to contain coronavirus infections
Videoconferencing app employs custom encryption scheme and uses servers based in Beijing, researchers find as Zoom popularity soars
Team headed by University of Glasgow develops technique for generating and detecting entangled photons at wavelength less susceptible to solar…
As popularity of Zoom app spikes due to coronavirus pandemic, security experts urge users to pay attention to privacy and…
Flaw in Converged Security Management Engine could allow attackers to remotely extract root cryptographic key, leading to 'utter chaos', researchers…
Exposed Virgin Media database links user details to requests to unblock pornographic and gambling sites, exposing customers to extortion attempts
Scammers are using fear around the coronavirus epidemic to spread malware via malicious email attachments, phishing messages and even a…
Redcar and Cleveland Borough Council online services offline for more than a week following incident that experts call a likely…
Update aimed to fix security issue with UEFI boot managers, but some users said they were left unable to reboot…
IOTA fixes bug in desktop cryptocurrency wallet after crooks make off with more than $1m, but network has remained offline…
Turkish government likely to be behind ongoing campaign of DNS hijacking incidents targeting rival countries, Western officials say
Hackers attempt to exploit critical flaw in Citrix ADC and Citrix Gateway to install 'Ragnarok' ransomware on vulnerable networks
Arrests in Netherlands and Northern Ireland as FBI seizes WeLeakInfo.com, which offered index of 10,000 data breaches for as little…
European Commission could temporarily bar facial recognition in public places as new rules to protect individuals' privacy are worked out