A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.
Get the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference.
A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.
A new framework is allowing the threat group to compile variants of the malware for each victim, Morphisec says.
Koadic toolkit gets upgrades - and a little love from nation-state hackers.
Researchers show how simply connecting to a rogue machine can silently compromise the host.
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.
An attack by a 'wizard hacker' results in leaked records for virtually every Bulgarian taxpayer.
Widespread privacy concerns have caused 60% of people to cover their laptop webcams - some in creative ways - survey data shows.
What will it take to align staff and budget to protect the organization?
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.
Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.
Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says.
The last-June breach exposed data includes names, phone numbers, and account numbers.
New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.
Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.