An old RAT learns an old trick. Via Vulnerabilities – Threatpost https://threatpost.com
Read more >>Phishing and zero-days continue to be a core part of the APT arsenal. Via Vulnerabilities – Threatp…
Read more >>The vulnerability can be exploited to reveal limited traffic data including a device’s IP address. …
Read more >>CVE-2020-10245, a heap-based buffer overflow that rates 10 out of 10 in severity, exists in the COD…
Read more >>The malware, the work of a new APT called TwoSail Junk, allows deep surveillance and total control …
Read more >>Threatpost Senior Editor Tara Seals is joined by Russ Mohr, engineer and Apple evangelist at Mobile…
Read more >>Apple's security update included a slew of vulnerabilities in various components of iOS, macOS …
Read more >>Researchers say that APT41's exploits are part of one of the broadest espionage campaigns they&…
Read more >>Adobe has fixed a critical flaw in its Creative Cloud Desktop Application for Windows. Via Vulnerab…
Read more >>Researchers said that a working exploit for CVE-2020-1938 leaked on GitHub makes is a snap to compr…
Read more >>Criminals behind botnets Chalubo, FBot and Moobot attack unpatched vulnerabilities in the commercia…
Read more >>While exploring a worn-down warehouse, I look through a window and see a room full of zomb…
Read more >>The unpatched Windows zero day flaws are being exploited in "limited, targeted" attacks, …
Read more >>Hacking contest goes virtual with participants remotely winning $295k in prizes for taking down Ado…
Read more >>Threatpost editors discuss this week's top news stories from COVID-19 themed malware attacks to…
Read more >>The botnet exploits a vulnerability discovered last month that can allow threat actors to remotely …
Read more >>A poll of Threatpost readers shows that security preparedness is uneven as organizations make an un…
Read more >>The high-severity flaws exist in the products using SD-WAN software earlier than Release 19.2.2. Vi…
Read more >>I am become death, the Slayer, the Hell-walker. I am Doomguy — protagonist of the Doom f…
Read more >>An analysis found these web frameworks to be the most-targeted by cybercriminals in 2019. Via Vulne…
Read more >>Fixes are now available for five critical and high-severity Trend Micro flaws, two of which are bei…
Read more >>An out-of-band Adobe security update addressed critical flaws in Photoshop, Acrobat Reader and othe…
Read more >>(Bloomberg) — Apple unveiled a new version of its iPad Pro that supports laptop-like trackp…
Read more >>COVID-19 is changing how we work. Weigh in on how your organization is securing its remote footprin…
Read more >>The Pakistani-linked APT has been spotted infecting victims with data exfiltration malware. Via Vul…
Read more >>Spring break just began for Kyii Sells-Wheeler, but he’s already wondering how he’ll compl…
Read more >>Organizations are sending employees and students home to work and learn -- but implementing the pla…
Read more >>The high-severity flaw allows malicious code injection into website pop-up windows. Via Vulnerabili…
Read more >>A Dutch researcher claimed Google's very first annual Cloud Platform bug-bounty prize, for a cl…
Read more >>I am observing what may be the future of work in a San Francisco skyscraper, watching as a…
Read more >>Over 16 security flaws, including multiple backdoors and hardcoded SSH server keys, plague the soft…
Read more >>CVE-2020-0796 affects version 3.1.1 of Microsoft’s SMB file-sharing system and was not included in …
Read more >>Bugs affecting programmable logic controllers (PLC) and physical access-control systems for facilit…
Read more >>March security updates include 115 CVEs patching everything from Windows, Office and Microsoft’s ne…
Read more >>The bug has been under active attack as a zero-day. Via Vulnerabilities – Threatpost https://threat…
Read more >>Mozilla Foundation snuffs out bugs with the introduction of Firefox 74 and ESR 68.6. Via Vulnerabil…
Read more >>Intel patched six high-severity flaws in its graphics drivers, as well as other vulnerabilities in …
Read more >>A Zoho zero day vulnerability and proof of concept (PoC) exploit code was disclosed on Twitter. Via…
Read more >>The high-severity flaws, existing in Webex Player and Webex Network Recording Player, can allow arb…
Read more >>Dozens of routers are patched by Netgear as it snuffs out critical, high and medium severity flaws.…
Read more >>So you want a smartphone that’s bigger, better, and faster than the pocket-stretching gadg…
Read more >>An exploit published by a developer is easy to use and has already been used to build malicious app…
Read more >>Troy Hunt said the popular HIBP will continue to be run as an independent service. Via Vulnerabilit…
Read more >>(Bloomberg) — Online brokerage platform Robinhood said it’s back up and running after an …
Read more >>Several flaws found in Nvidia's graphics drivers could enable denial of service, remote code ex…
Read more >>A security error in the Walgreens mobile app may have leaked customers' full names, prescriptio…
Read more >>Agnieszka Kurant’s lower Manhattan studio stands among a scattering of cultural outposts t…
Read more >>