Cyber-researchers weigh in on what concerns them the most as the U.S. heads into the final weekend …
Read more >>In all, WordPress patched 10 security bugs as part of the release of version 5.5.2 of its web publi…
Read more >>The DoNot APT threat group is leveraging the legitimate Google Firebase Cloud Messaging server as a…
Read more >>Threatpost breaks down the scariest stories of the week ended Oct. 30 haunting the security industr…
Read more >>Tech giant and feds this week renewed their urge to organizations to update Active Directory domain…
Read more >>NVIDIA said a high-severity information-disclosure bug impacting its DGX A100 server line wouldn…
Read more >>In a wide-ranging interview, a REvil leader said the gang is earning $100 million per year, and pro…
Read more >>Several federal agencies on Wednesday warned hospitals and cyber-researchers about “credib…
Read more >>The flaw in the console component of the WebLogic Server, CVE-2020-14882, is under active attack, r…
Read more >>The most-rewarded flaw is XSS, which is among those that are relatively cheap for organizations to …
Read more >>While Microsoft patched the bug known as CVE-2020-0796 back in March, more than one 100,000 Windows…
Read more >>The Phosphorous APT has launched successful attacks against world leaders who are attending the Mun…
Read more >>With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under …
Read more >>How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud durin…
Read more >>Popular chat apps, including LINE, Slack, Twitter DMs and others, can also leak location data and s…
Read more >>Veracode's Chris Eng discusses the cyber threats facing shoppers who are going online due to th…
Read more >>The flaw (CVE-2020-15157) is located in the container image-pulling process. Via Vulnerabilities – …
Read more >>Cybercriminals have already reportedly posted the details of 300 Vastaamo patients - and are threat…
Read more >>The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a …
Read more >>There are many areas of the election process that criminal hackers can target to influence election…
Read more >>Versions of Nvidia GeForce Experience for Windows prior to 3.20.5.70 are affected by a high-severit…
Read more >>An elaborate set of redirections and hundreds of URLs make up a wide-ranging tech-support scam. Via…
Read more >>Up to 50,000 Office 365 users are being targeted by a phishing campaign that purports to notify the…
Read more >>The Feds have published a Top 25 exploits list, rife with big names like BlueKeep, Zerologon and ot…
Read more >>The majority of the bugs in Cisco’s Firepower Threat Defense (FTD) and Adaptive Security Appliance …
Read more >>Over half of Oracle's flaws in its quarterly patch update can be remotely exploitable without a…
Read more >>The memory-corruption vulnerability exists in the browser’s FreeType font rendering library. Via Vu…
Read more >>The out-of-band patches follow a lighter-than-usual Patch Tuesday update earlier this month. Via Vu…
Read more >>Amazon, Apple, Netflix, Facebook and WhatsApp are top brands leveraged by cybercriminals in phishin…
Read more >>A set of address-spoofing bugs affect users of six different types of mobile browsers, with some re…
Read more >>The company already patched an API flaw that allowed a security researcher to use the app to find t…
Read more >>DOJ charges six Russian nationals for their alleged part in the NotPetya, Ukraine power grid and Ol…
Read more >>I’m flying through the Nadiri Dockyards, where the New Republic constructs warships to tak…
Read more >>Researchers said the group was able to move from initial phish to full domain-wide encryption in ju…
Read more >>A new threat report shows that APTs are switching up their tactics when exploiting Microsoft servic…
Read more >>In both cases, cybercriminals claim to have reams of information for the popular gaming titles. Via…
Read more >>The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could e…
Read more >>Google's Threat Analysis Group sheds more light on targeted credential phishing and malware att…
Read more >>Fortinet researchers are seeing a pivot in the spear-phishing and phishing lures used by cybercrimi…
Read more >>The move is a distinct change in direction for the app, which has been criticized and even banned f…
Read more >>Adobe says the two critical flaws (CVE-2020-24407 and CVE-2020-24400) could allow arbitrary code ex…
Read more >>In-game features of the just-released FIFA 21 title give scammers easy access its vast audience. Vi…
Read more >>After backlash over false marketing around its encryption policies, Zoom will finally roll out end-…
Read more >>Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS at…
Read more >>There were 11 critical bugs and six that were unpatched but publicly known in this month's regu…
Read more >>Researchers warn of a spike in the cryptocurrency-mining botnet since August 2020. Via Vulnerabilit…
Read more >>The flaw stems from a NULL Pointer Dereference error and plagues the Windows, macOS, Linux and Chro…
Read more >>Cybercriminals are chaining Microsoft's Zerologon flaw with other exploits in order to infiltra…
Read more >>The streaming box allows arbitrary code execution as root, paving the way to pilfering social-media…
Read more >>Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of su…
Read more >>Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for di…
Read more >>Three high-severity flaws exist in Cisco's Webex video conferencing system, Cisco’s Video Surve…
Read more >>A spike in phishing and malicious websites aimed at defrauding Amazon.com customers aim to make Pri…
Read more >>The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-0…
Read more >>Google is rolling out 35 security fixes, and a new password feature, in Chrome 86 versions for Wind…
Read more >>Researchers disclosed the 'WarezTheRemote' attack, affecting Comcast's XR11 voice remot…
Read more >>At SAS@Home, Luta Security CEO Katie Moussouris stressed that bug bounty programs aren't a '…
Read more >>Smart sex toy vulnerable to hacks, researchers say -- which could expose users’ most sensitive bits…
Read more >>The Magecart spinoff group targeted the wireless service provider in an odd choice of victim. Via V…
Read more >>Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for th…
Read more >>Team Showcase, a sister plugin, is also vulnerable to the XSS and PHP object-injection bugs -- toge…
Read more >>A variant of the Mirai botnet, called Ttint, has added espionage capabilities to complement its den…
Read more >>Phishing emails tell recipients that their voter's registration applications are incomplete - b…
Read more >>Larry Cashdollar, senior security response engineer at Akamai, talks about the craziest stories he&…
Read more >>In addition to Windows and Linux machines, a new variant of the malware now targets Mac and Android…
Read more >>