There's no doubt about it: the batch of stolen information leaked in the wake of the Hacking Team breach was a boon for exploit kit developers.
Attackers are actively exploiting a zero-day privilege escalation vulnerability affecting the latest version of Apple's OS.
A large-scale malvertising attack abusing Yahoo’s ad network has been hitting visitors of the Internet giant's many popular and heavy-traffic sites for nearly a week.
When talking about the Internet of Things - "things" with an embedded computing system able to interoperate within the Internet infrastructure - we usually think about fridges, thermostats, smart cars, garage doors, cameras, and various implants.
A group of Austrian and French researchers have devised a relatively simple way to remotely exploit the Rowhammer bug present in some computer chips.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.