Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Emerging ransomware variant targets all VMware ESXi hosts. Experts recommend patching immediately to avoid a potential breach. → Read More
Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks. → Read More
The head of Microsoft's Security Response Center defends keeping its initial vulnerability disclosures sparse — it is, she says, to protect customers. → Read More
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla. → Read More
Three flaws present in consumer laptops can give attackers a way to drop highly persistent malware capable of evading methods to remove it, security vendor says. → Read More
The maintainer of a widely used npm module served up an unwelcome surprise for developers. → Read More
Meanwhile, Apache Foundation releases third update to logging tool in 10 days to address yet another flaw. → Read More
The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve. → Read More
White-hat hacking event shows yet again why there's no such thing as foolproof security against modern attacks. → Read More
Check Point researchers recently discovered the Clast82 dropper hidden in nine legitimate Android utility apps. → Read More
The ransom is still a tiny portion of the total cost of a ransomware attack, but associated costs are increasing. → Read More
Global pandemic and the easy availability of for-hire services and inexpensive tool sets gave adversaries more opportunities to attack. → Read More
The criminals behind the DarkSide ransomware-as-a-service operation say the system will be harder to take down. → Read More
Goal was to see if computer-generated images that look like one person would get classified as another person. → Read More
Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at Black Hat say. → Read More
Over 7 million records exposed, according to vpnMentor, but app maker says there is no sign of malicious use. → Read More
More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT. → Read More
Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says. → Read More
Load Value Injection (LVI) takes advantage of speculative execution processes just like Meltdown and Spectre, say security researchers from Bitdefender and several universities. → Read More
New exploit builds on previous research involving Philips Hue Smart Bulbs. → Read More