exploit
Get your weekly updates on cyber law and cybercrime investigation by email or follow us on LinkedIn.
Read also: A global phishing syndicate used over 500 apps to steal data from phones, MITRE unveils a free tool to help organizations strengthen cyber resilience, and more.
Two separate vulnerability reports serve to illustrate that even best practice processes can fall short in the real world.
Dangerous flaws in the SHAREit Android app, recent attacks exploiting the latest Drupal bug, malicious docs distribution on hacked Bangladeshi embassy website, and more.
Top security flaws affecting open source products or technologies that caused a huge volume of security incidents.