Badbox is back and a million Android devices were backdooredA new variant of Badbox malware targets a million infected Android devices to form a massive botnet.
Experts doubt Oracle's breach denial as inside data emergesOracle Cloud's denial of a security breach is disputed by infosec researchers confirming leaked data's legitimacy.
Critical industries top ransomware hitlist, attacks dwindleRansomware attacks on critical industrial organizations have surged, indicating a shift in targeting as criminals grow more confident amid perceived lack of law enforcement response.
FortiGate config leaks: Victims' email addresses publishedThousands of email addresses from leaked FortiGate configs highlight organizations potentially impacted by previous zero-day exploits.
Badbox is back and a million Android devices were backdooredA new variant of Badbox malware targets a million infected Android devices to form a massive botnet.
Experts doubt Oracle's breach denial as inside data emergesOracle Cloud's denial of a security breach is disputed by infosec researchers confirming leaked data's legitimacy.
Critical industries top ransomware hitlist, attacks dwindleRansomware attacks on critical industrial organizations have surged, indicating a shift in targeting as criminals grow more confident amid perceived lack of law enforcement response.
FortiGate config leaks: Victims' email addresses publishedThousands of email addresses from leaked FortiGate configs highlight organizations potentially impacted by previous zero-day exploits.
Researcher trolls Microsoft over bug disclosure annoyanceMicrosoft faced criticism for requiring a video proof of concept for a bug report, which is generally not standard in the industry.
Microsoft wouldn't look at a bug report without a video. Researcher maliciously compliedMicrosoft's request for a video proof of concept is seen as excessive by vulnerability analysts.
Researcher trolls Microsoft over bug disclosure annoyanceMicrosoft faced criticism for requiring a video proof of concept for a bug report, which is generally not standard in the industry.
Microsoft wouldn't look at a bug report without a video. Researcher maliciously compliedMicrosoft's request for a video proof of concept is seen as excessive by vulnerability analysts.
Internet Archive attacked again, through ZendeskThe Internet Archive is struggling with a security breach, exposing user data and facing community backlash.
QNAP called out for dragging its heels on patch developmentResearchers publicly disclosed 15 vulnerabilities in QNAP systems due to delayed patches despite following the 90-day disclosure window.