Attackers are actively exploiting a zero-day privilege escalation vulnerability affecting the latest version of Apple's OS.
A large-scale malvertising attack abusing Yahoo’s ad network has been hitting visitors of the Internet giant's many popular and heavy-traffic sites for nearly a week.
When talking about the Internet of Things - "things" with an embedded computing system able to interoperate within the Internet infrastructure - we usually think about fridges, thermostats, smart cars, garage doors, cameras, and various implants.
A group of Austrian and French researchers have devised a relatively simple way to remotely exploit the Rowhammer bug present in some computer chips.
The comment period for the proposed amendments to the Wassenaar Arrangement regarding "cybersecurity items" has ended, and the overwhelming majority of the 150+ comments submitted are negative.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.