The FBI IC3 Internet Crime Report shows more than $1.7 billion in looses from BEC scams, far more than from any other kind of cybercrime activity it tracks.
Google has patched a critical Bluetooth flaw in Android that could give an attacker control of a vulnerable device without any user interaction.
The Department of Justice indicted four members of China's People's Liberation Army in connection with the Equifax data breach in 2017.
An attack campaign has targeted financial services using a new type of backdoor since early January, FireEye said.
Cisco has patched five serious vulnerabilities that affect routers, switches, and IP phones and cameras with the Cisco Discovery Protocol enabled.
Web shell attacks have been on the rise in recent months, as many APT groups employ them against enterprises.
While FCC chairman Ajit Pai said at least one wireless carrier sold location data in violation of federal law, it is far from clear whether the offending entity will face any penalties.
A flaw in the sudo utility could allow a local user to gain root privileges if the pwfeedback option is enabled.
A proposal that would standardize the format of SMS messages being used in two-factor authentication schemes has a simple goal: make users relying on those one-time passcodes less susceptible to phishing attacks.
A proposed bill by Sen. Lindsey Graham to prevent online child exploitation imagery could have a disastrous effect on end-to-end encryption.
Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and access to information, researchers said.
Disinformation campaigns and cyber operations are intersecting more and more often, as actors become more sophisticated in their use of both tactics in their operations.
Google and Mozilla over the past few weeks have taken steps to remove problematic extensions and add-ons that steal user data and execute remote code.
Researchers have identified yet another speculative execution attack method against Intel processors.
Improving online privacy for users will require a mix of technical, legislative, and regulatory approaches.