Aims to improve performance of FHE to make it practical for business and government to better protect confidential data in the cloud.
The Linux Foundation's sigstore code-signing software, developed with IBM and Red Hat, will help prevent attacks on the software supply chain
Gootloader component infects computers by hijacking Google search results to send victims to legitimate but compromised websites.
A cyber criminal group associated with the Egregor ransomware was dismantled in Ukraine following a joint action by US, French and Ukrainian authorities.
New iteration of TrickBot botnet, which had enabled Ryuk and other attacks, uses malicious links in emails rather than rogue email attachments.
Multi-national cooperation removes this key malware delivery service as a threat, at least temporarily.
Attack targets SonicWall's SMA Series access management gateways and is another in a string of incidents against security vendors.
A set of seven vulnerabilities, called DNSpooq, allows attackers to redirect users or execute malicious code. Patch dnsmasq now.
Security vendors can now leverage new telemetry and machine learning processing capabilities built into Intel's 11th Gen mobile processors.
A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software.
The theft of red team tools, allegedly by Russia's Cozy Bear group, poses only a small threat to other organisations.
The exploit requires the attacker to have valid credentials, but experts advise patching regardless.
Researchers discover a new TrickBot module that allows malware to persist even after reformatting or replacing a hard drive.
New research reveals the scale at which criminals have exploited public open-source Docker repositories to plant malware among container images.
This hacker-for-hire advanced persistent threat group uses its own custom malware and takes great effort to hide its activity.