Kerry Matre, senior director at Mandiant, discusses the appropriate metrics to use to measure SOC a…
Read more >>Threat actors may have been duking it out for control of the compromised devices, first using a 201…
Read more >>The "PrintNightmare" bug may not be fully patched, some experts are warning, leaving the …
Read more >>The bug in Edge's auto-translate could have let remote attackers pull off RCE on any foreign-la…
Read more >>Disclosure of a bug in Adobe’s content-management solution - used by Mastercard, LinkedIn and PlayS…
Read more >>A vulnerability in NVIDIA’s GeForce Experience software opens the door to remote data access, manip…
Read more >>In-the-wild XSS attacks have commenced against the security appliance (CVE-2020-3580), as researche…
Read more >>“I am totally screwed,” one user wailed after finding years of data nuked. Western Digital advised …
Read more >>The 9.4-rated bug in AppC could give attackers admin rights, no authentication required, letting th…
Read more >>A supply-chain attack could have siphoned sensitive information out of Jira, such as security issue…
Read more >>Four separate security bugs would give attackers almost complete control and persistence over targe…
Read more >>Remote, unauthenticated cyberattackers can infiltrate and take over the Cortex XSOAR platform, whic…
Read more >>A pair of zero-days affecting Pling-based marketplaces could allow for some ugly attacks on unsuspe…
Read more >>Company finally rolls out the complete fix this week for an RCE flaw affecting some 800,000 devices…
Read more >>These code bombs lurk in the PyPI package repository, waiting to be inadvertently baked into softwa…
Read more >>A year-old proof-of-concept attack that allows an attacker to bypass TLS email protections to snoop…
Read more >>“No remedy available as of June 21, 2021," according to the researcher who discovered the easy…
Read more >>Chipmaker patches nine high-severity bugs in its Jetson SoC framework tied to the way it handles lo…
Read more >>An unsophisticated campaign shows that the pandemic still has long legs when it comes to being soci…
Read more >>… until you reset network settings and stop connecting to a weirdly named network, that is. FUD is …
Read more >>What's the low-hanging fruit for ransomware attackers? What steps could help to fend them off, …
Read more >>The intro-level networking gear for SMBs could allow remote attacks designed to steal information, …
Read more >>The incident showcases basic steps that organizations can take to protect themselves as ransomware …
Read more >>DETROIT — General Motors will raise its spending on electric and autonomous vehicles and a…
Read more >>An attacker with initial physical access (say, at a gym) could gain root entry to the interactive t…
Read more >>A supply-chain component lays open camera feeds to remote attackers thanks to a critical security v…
Read more >>Apple patched two bugs impacting its Safari browser WebKit engine that it said are actively being e…
Read more >>Utilities’ vulnerability to application exploits goes from bad to worse in just weeks. Via Vulner…
Read more >>Attackers could have used the bug to get read/write privileges for a victim user’s email, Teams cha…
Read more >>An analysis of the campaign revealed Cyberium, an active Mirai-variant malware hosting site. Via Vu…
Read more >>Recently, TikTok made a change to its U.S. privacy policy, allowing the company to “autom…
Read more >>A trio of security flaws open the door to remote-code execution and a malware tsunami. Via Vulnerab…
Read more >>Google has patched its Chrome browser, fixing one critical cache issue and a second bug being activ…
Read more >>The desktop conferencing IoT gadget allows remote attackers to install all kinds of malware and mov…
Read more >>The decision to pay the ransom demanded by the cybercriminal group was to avoid any further issues …
Read more >>The higher-rated advisories focus on privilege-escalation bugs in CPU firmware: Tough to patch, har…
Read more >>Researchers discovered a highly targeted malware campaign launched in April, in which a new, unknow…
Read more >>Google's June security bulletin addresses 90+ bugs in Android and Pixel devices. Via Vulnerabil…
Read more >>“Siloscape”, the first malware to target Windows containers, breaks out of Kubernetes clusters to p…
Read more >>Unprotected server exposes AMT Games user data containing user emails and purchase information. Via…
Read more >>REvil threat actors may be behind a set of PowerShell scripts developed for encryption and weaponiz…
Read more >>Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, discusses best pract…
Read more >>In this Threatpost podcast, Fortinet’s top researcher sketches out the ransom landscape, with takea…
Read more >>Companies relying on their cyber-insurance policies to pay off ransomware criminals are being blame…
Read more >>Some criminals package exploits into bundles to sell on cybercriminal forums years after they were …
Read more >>