A daily overview of the latest hacking news, exploits, vulnerabilities, leaks…. everything und
APT using malicious Chrome Extension, Google Maps notification spam, and Adobe Flash actively exploi
Republican campaign committee hack, 1-800-Flowers payment card breach, and Google's December An
Quora hack exposes 100 million users' data, shady iOS apps use Touch ID to steal money, and cla
Black Hat Europe 2018 kicks off today in London so on episode 175 of our daily podcast we highlight
Zoom conferencing app vulnerability, Dunkin' Donuts alerts customers to a potential data breach
Two charged in connection with SamSam ransomware, breach exposes 2.65 million Atrium Health records,
Google details the discovery and takedown of 3ve fraud botnet, eight charged in connection to 3ve fr
Ransomware forces Ohia and West Virginia hospitals to divert ER patients, Knuddels app receives Germ
The USPS fixed a security vulnerability exposing 60 million users' info a year after being noti
Facebook increases Bug Bounty payouts for account takeover vulnerabilities, Amazon leaks customer em
Active XSS attacks exploiting vulnerable Wordpress plugin, Sofacy aka Fancy Bear using new Cannon Tr
Interview with security researcher at Pen Test Partners, Ken Munro, on the firm's recent discov
Twitter says third-party app used in Bitcoin scams, Instagram flaw leaked plain text passwords and o
Kids miSafes watch vulnerabilities put children at risk, Firefox to display a warning on sites with
More Spectre and Meltdown attacks discovered, new US cybersecurity agency bill moves forward and Goo
A look at seven of the MageCart groups and November's Microsoft Patch Tuesday update on episode
New nation-state backed group targets Pakistan military, the Paris cybercrime agreement and a Trojan
Ruby impacted by deserialization issues, Steam bug awards researcher $20,000 bounty and 5th guilty p
Pentagon begins uploading APT malware samples to VirusTotal, Lazarus Group's FastCash malware t
New GPU side-channel attacks, new initiative looks to place military veterans in cybersecurity roles