Security researchers have discovered serious weaknesses and total breakdown in WPA2, a security protocol used to secure protected Wi-Fi networks. An attacker within range of a victim's Wi-Fi device could exploit these weaknesses using key reinstallation attacks (KRACKs).
Security researchers discovered a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
Serious security vulnerabilities have been found in Arris-manufactured modems used by AT&T's U-verse service.
Email and data security company Mimecast has exposed a potentially dangerous email vulnerability and exploit called ROPEMAKER.
LG Electronics confirmed that WannaCry ransomware was responsible for last week's infections that took down self-service kiosks.
Check Point identified a vulnerability in LinkedIn's messenger service that could allow an attacker to exploit and then spread malicious files masquerading as a resume or other legitimate files (such as doc, xls, ppt files).
A hacker going by the name of xerub claims to have published the decryption key that could be used to unlock the Apple iOS’ Secure Enclave Processor (SEP) firmware.
Hackers allegedly linked to Russian actor APT28 may be linked to a campaign targeting travelers in hotels in Europe and the Middle East, with activity dating back to July 2017.
The Department of Justice (DOJ) Criminal Division Cybersecurity Unit has developed a framework to assist organizations interested in creating a formal vulnerability disclosure program.
WikiLeaks has detailed three leaked hacking tools, Achilles, Aeris and SeaPea, used to target Mac OS X and POSIX systems.