Xcsset Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari

An In-Depth Technical Analysis of CurveBall (CVE-2020-0601)

Cybercriminals Use Malicious Memes That Communicate with Malware

GDPR vs. Blockchain: Technology vs. The Law

The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard

Android Backdoor GhostCtrl Can Silently Record Your Audio, Video, and More

Researchers discover malware that activates when user hovers mouse over links and images in MS PowerPoint docs

FLocker Mobile Ransomware Crosses to Smart TV

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

Let's Encrypt Now Being Abused By Malvertisers

Setting the Record Straight on Baidu's Moplus SDK and the Wormhole Vulnerability

First Java Zero-Day Attack in Two Years Targets NATO and US Defense Organizations

Trend Micro Discovers New Java Zero-Day Exploit

Hacking Team Uses UEFI BiOS Rootkit to Keep RCS 9 Agent in Target Systems

Not So Spooky: Linux “Ghost” Vulnerability