South Korean police have confirmed the involvement of hackers linked to North Korean intelligence in a major...
Ubuntu Linux has come under scrutiny following the discovery of long-standing vulnerabilities in the needrestart utility, which...
Before 1994, most scanning technologies relied on one-dimensional barcodes, capable of storing only up to 80 alphanumeric...
A new Linux backdoor, dubbed WolfsBane, has been discovered, which researchers believe to be a port of...
The fintech company Finastra has fallen victim to a cyberattack resulting in the theft of over 400...
The United States Coast Guard has issued a warning regarding Chinese-made port cranes, citing “embedded vulnerabilities” that...
A vulnerability has been discovered in the 7-Zip file compression tool, enabling attackers to remotely execute malicious...
Hackers exploited two zero-day vulnerabilities in Palo Alto Networks’ software, compromising potentially thousands of organizations worldwide. The...
Researchers from Unit42 have uncovered a new strain of malware, FrostyGoop, targeting Industrial Control System (ICS) devices....
Challenges with cyber espionage and supply chain vulnerabilities are prompting African nations to explore strategies for diversifying...
The U.S. Department of Justice has proposed that Google be required to divest its Chrome browser to...
U.S. Senator Richard Blumenthal has declared that the operations of American technology companies in China pose a...