Ransomware gangs with zero-days and more players overall will characterize financially motivated cy…
Read more >>While 2021 will present evolving threats and new challenges, it will also offer new tools and techn…
Read more >>Designing a behavioral change program requires an audit of existing security practices and where th…
Read more >>Attackers are targeting the critical remote code-execution flaw to compromise systems in the health…
Read more >>Reducing the risks of remote work starts with updating the access policies of yesterday. Via Vulner…
Read more >>The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investi…
Read more >>Cyberattackers could use the information to track users across devices, disable phone service, or i…
Read more >>Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this t…
Read more >>VMware explained it has no patch for a critical escalation-of-privileges bug that impacts both Wind…
Read more >>‘Vishing’ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains Nice…
Read more >>The popular U.K. soccer club confirmed an attack but said personal fan data remains secure. Via Vul…
Read more >>The critical and important-severity flaws were found by a team at the China-based Tiunfu Cup hackin…
Read more >>The company patched a vulnerability that could connected video and audio calls without the knowledg…
Read more >>Bug hunters at GitHub Security Labs help shore up German contact tracing app security, crediting op…
Read more >>The vulnerable version of the app, which has 100 million users, uses easily predictable URLs to lin…
Read more >>Security experts praised the newly approved IoT law as a step in the right direction for insecure c…
Read more >>WordPress websites using buggy Epsilon Framework themes are being hunted by hackers. Via Vulnerabil…
Read more >>Cisco patched the Webex flaw, as well as three critical-severity vulnerabilities, in a slew of secu…
Read more >>Overall Google's Chrome 87 release fixed 33 security vulnerabilities. Via Vulnerabilities – Thr…
Read more >>Four industrial control system vendors each announced vulnerabilities that ranged from critical to …
Read more >>A critical path-traversal flaw (CVE-2020-27130) exists in Cisco Security Manager that lays bare sen…
Read more >>Attackers can exploit the feature and send people’s data directly to remote servers, posing a priva…
Read more >>An API bug exposed personal information of users like political leanings, astrological signs, educa…
Read more >>The bugs tracked as CVE-2020–8271, CVE-2020–8272 and CVE-2020–8273 exist in the Citrix SD-WAN Cente…
Read more >>With more online shoppers this year due to COVID-19, cybercriminals are pulling the trigger on new …
Read more >>The North Face has reset an undisclosed number of customer accounts after detecting a credential-st…
Read more >>Hacker forums are a rich source of threat intelligence. Via Vulnerabilities – Threatpost https://th…
Read more >>Security problems in Schneider Electric programmable logic controllers allow compromise of the hard…
Read more >>After seven years, millions of consoles sold, and a generation of users clamoring for an u…
Read more >>Browser users are once again being asked to patch severe vulnerabilities. Via Vulnerabilities – Thr…
Read more >>Three security vulnerabilities can be chained to enable unauthenticated remote code execution. Via …
Read more >>Both Nvidia and Intel faced severe security issues this week - including a high-severity bug in Nvi…
Read more >>The flaw stems from an issue with the ingress packet processing function of Cisco IOS XR software. …
Read more >>Philippines COVID-KAYA app allowed for unauthorized access typically protected by ‘superuser’ crede…
Read more >>Months after first teasing the news, Apple on Tuesday unveiled a trio of Mac desktop and l…
Read more >>Remote code execution vulnerabilities dominate this month’s security bulletin of warnings and patch…
Read more >>Intel released 40 security advisories in total, addressing critical- and high-severity flaws across…
Read more >>Microsoft warns that cybercriminals are using Cobalt Strike to infect entire networks beyond the in…
Read more >>Slapdash setup of Trump website collecting reports of Maricopa County in-person vote irregularities…
Read more >>The cyberattack has halted chemotherapy, mammogram and screening appointments, and led to 300 staff…
Read more >>Three critical security bugs allow for easy privilege escalation to an administrator role. Via Vuln…
Read more >>An attack on the Microsoft Exchange server of an organization in Kuwait revealed two never-before-s…
Read more >>A cloud misconfiguration affecting users of a popular reservation platform threatens travelers with…
Read more >>The shopping cart application contains a PHP object-injection bug. Via Vulnerabilities – Threatpost…
Read more >>The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 diffe…
Read more >>The actively exploited vulnerabilities discovered by Project Zero exist across iPhone, iPad and iPo…
Read more >>Cisco also disclosed high-severity vulnerabilities in its Webex and SD-WAN products. Via Vulnerabil…
Read more >>Cannabis journaling platform GrowDiaries exposed more than 3.4 million user records online, many fr…
Read more >>A previous fix for the critical remote code execution bug was "incomplete," according to …
Read more >>A threat actor is compromising telecommunications companies and targeted financial and professional…
Read more >>The APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, larg…
Read more >>Patches for both the Chrome desktop and Android browser address high-severity flaws with known expl…
Read more >>The critical-severity Adobe Acrobat and Reader vulnerabilities could enable arbitrary code executio…
Read more >>The remote code-execution flaw (CVE-2020-14750) is low-complexity and requires no user interaction …
Read more >>Aleksandr Brovko faces jail time after stealing $100 million worth of personal identifiable informa…
Read more >>Automation, strategic process design and an investment in training are the keys to managing the cyb…
Read more >>WordPress bungles critical security 5.5.2 fix and saves face next day with 5.5.3 update. Via Vulner…
Read more >>JM Bullion fell victim to a payment-card skimmer, which was in place for five months. Via Vulnerabi…
Read more >>Google Project Zero disclosed the bug before a patch becomes available from Microsoft. Via Vulnerab…
Read more >>