According to a recent study, researchers have found that DDoS attacks have risen to nearly 30,000 per day globally.
Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.
Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.
An older MacOS API is still being used by many developers, despite risks. While a new API has been released, it isn't considered to be a good replacement.
Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
A bad data backup configuration recently exposed email spammers, gives security professionals an inside look at spam operations.
Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
The authors of the Sundown exploit kit leveraged research conducted by Texas-based security firm Theori to develop a PoC exploit.