Please turn on your JavaScript for this page to function normally.
Deepquest
Next level red teaming: Working behind enemy lines

The term “hacker” calls forth both positive and negative mental pictures, but I can bet that there are not many people, even in the infosec community, to whom the …

Tor Project
Actively exploited Firefox, Tor Browser 0-day patched, update now!

Mozilla and the Tor Project have released security updates that fix the Firefox 0-day flaw that was spotted being exploited to de-anonymize Tor Browser users. It is still …

Europol
Europol terrorism investigations data found exposed online

700 pages of confidential dossiers, which included details about terrorism investigations in Europe, have been found exposed on the Internet by the reporters of Dutch TV …

Headache
Do you know which data compliance standards apply to your organization?

Despite the explosion in data collection among companies in every sector and the well-documented risks of cyber threats, a new Liaison Technologies survey of nearly 500 US …

Node.js Foundation
Node.js Foundation to oversee the Node.js Security Project

The Node.js Security Project will become a part of the Node.js Foundation, a community-led and industry-backed consortium to advance the development of the Node.js platform. …

Dedrone
Deutsche Telekom goes drone hunting

Drone popularity continues to rise rapidly as they become ever cheaper and more powerful. Easy availability and large payloads conspire to increase the potential for dangerous …

danger
Gooligan Android malware used to breach a million Google accounts

Check Point security researchers have revealed a new variant of Android malware, breaching the security of more than one million Google accounts. The new malware campaign, …

Video chat
Organized sextortion led four British men to suicide​

Sextortion/webcam blackmail is a booming business for organised crime groups from the Philippines, Ivory Coast and Morocco, and young men across the UK are the most …

mask
Firefox 0-day exploited in the wild to unmask Tor users

An anonymous user of the SIGAINT darknet email service has revealed the existence of a JavaScript exploit that is apparently being actively used to de-anonymize Tor Browser …

data
Tips for businesses to avoid being the next big headline

Data integrity breaches are set to send shockwaves throughout the world in 2017, with at least one almighty breach disclosure of this type expected next year, according to …

Waterfall BlackBox
Seal the integrity of your logs with Waterfall BlackBox

Upon discovery of a cyberattack, forensic experts look inside the compromised network’s various logs to locate and analyze tracks left by the attacker. Logs are the baseline …

Technology
SMEs more prone, but still quite oblivious, to cyberattacks

Despite governments, organizations and brands intensifying their cybersecurity awareness campaigns in recent years, as well as several recent high-profile attacks and security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools