Google asks mobile security vendors to help keep hackers out of the Play Store
In announcing the partnership, Google acknowledged that the current processes for reporting malicious apps “aren’t designed to scale.”
How would MITRE’s popular cyberattack framework apply to industrial control systems?
The ATT&CK framework should account for the “full gamut of adversary behavior,” says one of the lead cybersecurity engineers who helps maintain the popular document.
A malicious Tor browser is helping scammers steal bitcoin, researchers say
The attacks comes as the Tor Project is trying to enhance trust in the anonymity browser.
Cozy Bear kept moving after 2016 election, ESET says
The group, also known as APT29 and the Dukes, was "able to fly under the radar for many years while compromising high-value targets, as before," according to ESET.
Russian hackers go after diplomatic targets in Eastern Europe and Central Asia, researchers say
It is just the latest in a string of apparent Russian efforts to breach diplomatic targets.
DanaBot banking trojan hits Germany again, with new targets
DanaBot is being used to hit German retail websites, including H&M, according to new research from Webroot.