Threat actors could exploit vulnerabilities in the Bluetooth Core and Mesh specifications to impersonate devices during pairing, paving the way …

Threat actors could exploit vulnerabilities in the Bluetooth Core and Mesh specifications to impersonate devices during pairing, paving the way …
Attacks on control processes, such as systems in industrial settings, are on the rise with common and unsophisticated methods being …
The Federal Bureau of Investigation (FBI) has linked the Conti ransomware group to at least 16 attacks aimed at disrupting …
The chief executive of Colonial Pipeline has defended paying cybercriminals who launched a devastating attack on the company, calling it …
One of the largest insurance companies in the United States, CNA Financial, reportedly agreed to a $40 million payment to …
Dublin’s High Court has issued an injunction against the Conti ransomware group to stop data belonging to Ireland’s health service …
Researchers analyzing Android apps have discovered serious cloud misconfigurations leading to the potential exposure of data belonging to over 100 …
The Bizarro banking Trojan has targeted customers of at least 70 banks as it moves from its Brazilian base to …
Researchers have explored the latest activities of the Lemon Duck hacking group, including the leverage of Microsoft Exchange Server vulnerabilities …
Researchers have discovered hundreds of malicious mobile apps that are exploiting interest in cryptocurrency and stocks to steal from victims. …