Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys

Hacker forums are a rich source of threat intelligence. Continue reading Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys

Two Chrome Browser Updates Plugs Holes Actively Targeted by Exploits

Patches for both the Chrome desktop and Android browser address high-severity flaws with known exploits available in the wild. Continue reading Two Chrome Browser Updates Plugs Holes Actively Targeted by Exploits

Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple’s Bug Bounty Program

A comprehensive three-month analysis of Apple’s online services has netted a team of security researchers a $288,500 reward after reporting critical vulnerabilities as part of its bug bounty program. In total, the researchers disclosed 55 vulnerabiliti… Continue reading Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple’s Bug Bounty Program

New Wiper Malware Blames Two Security Researchers for Infection

A new wiper malware falsely informed victims in its infection notice that two security researchers had been responsible for attacking them. According to Bleeping Computer, users who downloaded programs from free software and crack sites found that they… Continue reading New Wiper Malware Blames Two Security Researchers for Infection

Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products. Continue reading Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

As Phones Get Harder to Hack, Zero Day Vendors Hunt for Router Exploits

Obtaining vulnerabilities for fully up-to-date mobile phones is getting harder. So companies that sell exploits to governments are increasingly looking for attacks that target internet routers instead, with one company paying up to $100,000. Continue reading As Phones Get Harder to Hack, Zero Day Vendors Hunt for Router Exploits