Source: zdnet.com

Drupal patches critical access bypass flaw in engine core

Drupal patches critical access bypass flaw in engine core

Russian hacking campaign targets G20 attendees with booby-trapped invites

Russian hacking campaign targets G20 attendees with booby-trapped invites

LambdaLocker ransomware victim? Now you can decrypt your files for free

LambdaLocker ransomware victim? Now you can decrypt your files for free

Telstra launching cybersecurity centres internationally

Telstra launching cybersecurity centres internationally

Australian businesses targeted in Cisco switch and router attacks: ACSC

Australian businesses targeted in Cisco switch and router attacks: ACSC

Claims resurface that Kaspersky helped Russian intelligence

Claims resurface that Kaspersky helped Russian intelligence

Cities might be getting smart, but are they secure?

Cities might be getting smart, but are they secure?

Petya ransomware: Cyber attack costs could hit $300m for shipping giant Maersk

Petya ransomware: Cyber attack costs could hit $300m for shipping giant Maersk

Rackspace rolls out managed data protection service

Rackspace rolls out managed data protection service

New Trojan malware campaign sends users to fake banking site that looks just like the real thing

New Trojan malware campaign sends users to fake banking site that looks just like the real thing

Salesforce fires red team staffers who gave Defcon talk

Salesforce fires red team staffers who gave Defcon talk

Destructive, disk-encrypting Mamba ransomware springs back to life

Destructive, disk-encrypting Mamba ransomware springs back to life

Cybercrime in China is the same, but different

Cybercrime in China is the same, but different

Google: Android 8.0 OTA updates will still work even when phones have no space

Google: Android 8.0 OTA updates will still work even when phones have no space

Cyberwar: A guide to the frightening future of online conflict

Cyberwar: A guide to the frightening future of online conflict

Self-driving cars vs hackers: Can these eight rules stop security breaches?

Self-driving cars vs hackers: Can these eight rules stop security breaches?