Archives: May 2018
You are here: Home \ 2018 \ May \ Page 8
The flaws would leave the enterprise devices helpless to a range of remote threats, including the charms of the Reaper IoT botnet.
Adobe fixed critical vulnerabilities in Adobe Flash Player and Creative Cloud as part of its regularly scheduled May Security Bulletin, on Tuesday.
As companies continue to install the vulnerable version of Apache Struts behind the breach, Equifax has filed a clarification statement.
Tech-support scams took off during the year, while whaling/business email compromise was the main threat, accounting for losses of more than $675 million.
The two have been arraigned in a Georgia district court on charges relating to an elaborate voice- and SMS-phishing (i.e., vishing/smishing) scheme.
Ransomware adopts Process Doppelgänging technique to avoid antivirus researchers and avoid detection in a newly identified malware double threat targeting users in the U.S., Kuwait and Germany.
The idea is to use trusted execution environments to build trust across various cloud-related use cases, including 5G, virtual network functions (VNFs), blockchain and more.
Hundreds of sites vulnerable to ‘Drupalgeddon 2.0’ have been impacted by a massive cryptomining campaign.
Lenovo warns of a high-severity bug impacting its System x line of servers, along with a medium-severity buffer-overflow vulnerability affecting its popular ThinkPad line.
Intel may be facing as many as eight new Spectre-level vulnerabilities in its chips, a German magazine alleges.