Malware in PyPI Code Shows Supply Chain Risks

A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.

Europol Head Fears 5G Will Give Criminals an Edge

Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.

Mirai Groups Target Business IoT Devices

More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.

The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike

Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.

Crack the Defenses of iOS and other Platforms at Black Hat USA

Get the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference.

What is the dark web? And what will you find there?

The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.

Security Lessons From a New Programming Language

A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.

BitPaymer Ransomware Operators Wage Custom, Targeted Attacks

A new framework is allowing the threat group to compile variants of the malware for each victim, Morphisec says.

RDP Bug Takes New Approach to Host Compromise

Researchers show how simply connecting to a rogue machine can silently compromise the host.

Open Source Hacking Tool Grows Up

Koadic toolkit gets upgrades - and a little love from nation-state hackers.