WikiLeaks Vault 8 leaks Hive
WikiLeaks has released a new series of leaks, called Vault 8, that contains source code and analysis for software designed to run on servers controlled by the CIA.
WikiLeaks has released a new series of leaks, called Vault 8, that contains source code and analysis for software designed to run on servers controlled by the CIA.
Appthority has discovered a significant data exposure vulnerability called Eavesdropper that impacts nearly 700 enterprise apps associated with 85 Twilio developer accounts.
Security researchers have discovered serious weaknesses and total breakdown in WPA2, a security protocol used to secure protected Wi-Fi networks. An attacker within range of a victim's Wi-Fi device could exploit these weaknesses using key reinstallation attacks (KRACKs).
Security researchers discovered a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
Serious security vulnerabilities have been found in Arris-manufactured modems used by AT&T's U-verse service.
Email and data security company Mimecast has exposed a potentially dangerous email vulnerability and exploit called ROPEMAKER.
LG Electronics confirmed that WannaCry ransomware was responsible for last week's infections that took down self-service kiosks.
Check Point identified a vulnerability in LinkedIn's messenger service that could allow an attacker to exploit and then spread malicious files masquerading as a resume or other legitimate files (such as doc, xls, ppt files).
A hacker going by the name of xerub claims to have published the decryption key that could be used to unlock the Apple iOS’ Secure Enclave Processor (SEP) firmware.
Hackers allegedly linked to Russian actor APT28 may be linked to a campaign targeting travelers in hotels in Europe and the Middle East, with activity dating back to July 2017.