Ransomware response demands a whole-of-business plan before the next attack, according to our round…
Read more >>Stolen email credentials are being used to hijack home surveillance devices, such as Ring, to call …
Read more >>A look back at what was hot with readers -- offering a snapshot of the security stories that were m…
Read more >>Bugcrowd CTO Casey Ellis covers new cybersecurity challenges for online retailers. Via Vulnerabilit…
Read more >>David “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding &qu…
Read more >>Threatpost explores 5 big takeaways from 2020 -- and what they mean for 2021. Via Vulnerabilities –…
Read more >>In-depth report looks at how COVID-19 research has become as a juicy new target for organized cyber…
Read more >>The LPE bug could allow an attacker to install programs; view, change, or delete data; or create ne…
Read more >>Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do …
Read more >>Investigation reveals device sector is problem plagued when it comes to security bugs. Via Vulnerab…
Read more >>Saryu Nayyar of Gurucul discusses state and state-sponsored threat actors, the apex predators of th…
Read more >>The phones of 36 journalists were infected by four APTs, possibly linked to Saudi Arabia or the UAE…
Read more >>The bugs rate 10 out of 10 on the vulnerability-severity scale, thanks to the ease of exploitation.…
Read more >>What are the riskiest links in the virtual healthcare chain? Threatpost readers weigh in as part of…
Read more >>The cyber security firm FireEye revealed that it has been the victim of a massive, long-r…
Read more >>Researchers predict software security will continue to struggle to keep up with cloud and IoT in th…
Read more >>Examining the backdoor's DNS communications led researchers to find a government agency and a b…
Read more >>The ongoing, growing campaign is “effectively an attack on the United States and its government and…
Read more >>Threat actors impersonate Google Play store in scam as Sony pulls the game off the PlayStation stor…
Read more >>Sources said the DoE suffered "damage" in the attack, which also likely extends beyond th…
Read more >>A critical unrestricted file upload bug in Contact Form 7 allows an unauthenticated visitor to take…
Read more >>No charges for Dutch ethical hacker Victor Gevers who prosecutors say did actually access Trump’s T…
Read more >>Cyberpunk 2077 and the constellation of controversy orbiting it—at nearly every level of …
Read more >>Meanwhile, Microsoft and other vendors are quickly moving to block the Sunburst backdoor used in th…
Read more >>A poorly configured file opens users up to site takeover. Via Vulnerabilities – Threatpost https://…
Read more >>The worm returned in recent attacks against web applications, IP cameras and routers. Via Vulnerabi…
Read more >>Mozilla Foundation releases Firefox 84 browser, fixing several flaws and delivering performance gai…
Read more >>Industrial, factory and medical gear remain largely unpatched when it comes to the URGENT/11 and CD…
Read more >>The insider threat will go to jail for two years after compromising Cisco's cloud infrastructur…
Read more >>The attack was mounted via SolarWinds Orion, in a manual and targeted supply-chain effort. Via Vuln…
Read more >>Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with t…
Read more >>The newly discovered Python-based malware family targets the Outlook processes, and browser credent…
Read more >>Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers foun…
Read more >>The malware takes aim at PostgreSQL database servers with never-before-seen techniques. Via Vulnera…
Read more >>Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and mor…
Read more >>Fortinet's Aamir Lakhani discusses best practices for securing company data against next-gen th…
Read more >>Ransomware actors behind the attack have breached at least 85,000 MySQL servers, and are currently …
Read more >>A series of bugs, patched in September, still allow remote code execution by attackers. Via Vulnera…
Read more >>From eCommerce threats, to attacks at the smart edge, Fortinet researchers discuss the top evolving…
Read more >>Ransomware attacks targeting hospitals have exacted a human cost as well as financial. Via Vulnerab…
Read more >>Valve fixed critical bugs in its Steam gaming client, which is a platform for popular video games l…
Read more >>As just one symptom, 83 percent of the Top 30 U.S. retailers have vulnerabilities which pose an “im…
Read more >>Convincing email-credentials phishing, emailed backdoors and mobile apps are all part of the groups…
Read more >>Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and …
Read more >>Google updates its mobile OS, fixing ten critical bugs, including one remote code execution flaw. V…
Read more >>Nine critical bugs and 58 overall fixes mark the last scheduled security advisory of 2020. Via Vuln…
Read more >>A CISA alert is flagging a critical default credentials issue that affects 100+ types of devices fo…
Read more >>Adobe fixed three critical-severity flaws in Adobe Prelude, Adobe Experience Manager and Adobe Ligh…
Read more >>A new set of vulnerabilities has been discovered affecting millions of routers and IoT and OT devic…
Read more >>Feds are warning that adversaries are exploiting a weeks-old bug in VMware’s Workspace One Access a…
Read more >>As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patie…
Read more >>In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive…
Read more >>The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.…
Read more >>It’s been just a few weeks since the Microsoft Xbox Series S/X and Sony PlayStation 5 cons…
Read more >>Desktop versions of the browser received a total of eight fixes, half rated high-severity. Via Vuln…
Read more >>The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign…
Read more >>VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to …
Read more >>A new "TrickBoot" module scans for vulnerable firmware and has the ability to read, write…
Read more >>Lookout's Hank Schless discusses accelerated threats to mobile endpoints in the age of COVID-19…
Read more >>Patches for a flaw (CVE-2020-8913) in the Google Play Core Library have not been implemented by sev…
Read more >>The feds have seen ongoing cyberattacks on think-tanks (bent on espionage, malware delivery and mor…
Read more >>CISA warns the leading enterprise document management platform is open to attack and urges companie…
Read more >>The post-COVID-19 surge in the criticality level of medical infrastructure, coupled with across-the…
Read more >>Researcher Ian Beer from Google Project Zero took six months to figure out the radio-proximity expl…
Read more >>The GO SMS Pro app has been downloaded 100 million times; now, underground forums are actively shar…
Read more >>An offshore Cayman Islands bank’s backups, covering a $500 million investment portfolio, were left …
Read more >>Four security vulnerabilities in an open-source medical records management platform allow remote co…
Read more >>More than a month after the cyberattack first hit, the UVM health network is still grappling with d…
Read more >>