According to new research, more companies are enabling biometric authentication on devices to verify access requests.
Stories by Lucian Constantin
Researchers released two tools--Muraen and NecroBrowser--that automate phishing attacks that can bypass 2FA. Most defenses won't stop them.
A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances.
Detected scans suggest attacker are seeking vulnerable servers to target for attacks.
Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
The decade-old Qbot financial malware has resurfaced with an improved version in a new attack that has infected thousands of systems so far.
WootCloud researchers discover an internet of things botnet based on Mirai that exploits Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.
Microsoft has removed eight applications from its app store for Windows that were mining Monero crypto-currency without users' knowledge.
The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, according to DLA Piper findings.
A survey of highly qualified data management professionals by 451 Research shows that growing data volumes have made security their biggest concern.
A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs.
As the WannaCry ransomware attack evolves, more cybercriminals are likely to attempt to profit from the vulnerability it exploits and similar flaws in the future.
In response to recent attacks where hackers abused Google's OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users' data.
Attackers behind the highly successful Locky and Bart ransomware campaigns have returned with a new creation: A malicious file-encrypting program called Jaff that asks victims for payments of around $3,700