Google asks mobile security vendors to help keep hackers out of the Play Store

by Sean Lyngaas • 1 week ago

In announcing the partnership, Google acknowledged that the current processes for reporting malicious apps “aren’t designed to scale.”

How would MITRE’s popular cyberattack framework apply to industrial control systems?

by Sean Lyngaas • 2 weeks ago

The ATT&CK framework should account for the “full gamut of adversary behavior,” says one of the lead cybersecurity engineers who helps maintain the popular document.

A malicious Tor browser is helping scammers steal bitcoin, researchers say

by Sean Lyngaas • 4 weeks ago

The attacks comes as the Tor Project is trying to enhance trust in the anonymity browser.

Cozy Bear kept moving after 2016 election, ESET says

by Jeff Stone • 1 month ago

The group, also known as APT29 and the Dukes, was "able to fly under the radar for many years while compromising high-value targets, as before," according to ESET.

Russian hackers go after diplomatic targets in Eastern Europe and Central Asia, researchers say

by Sean Lyngaas • 2 months ago

It is just the latest in a string of apparent Russian efforts to breach diplomatic targets.

DanaBot banking trojan hits Germany again, with new targets

by Shannon Vavra • 3 months ago

DanaBot is being used to hit German retail websites, including H&M, according to new research from Webroot.

TwitterFacebookLinkedInRedditGoogle Gmail