Archives: August 2018
You are here: Home \ 2018 \ August \ Page 2
The service gleans information from receipts, travel itineraries, trade confirmations for online brokerages, Uber messages, auto-loan confirmations, promotions and much more.
The Schneider Electric PowerLogic PM5560 and Modicon M221 are both susceptible to attack via an array of high-severity flaws.
Having the right set of broad data is the linchpin to effective threat-hunting.
Threatpost talks to a Google Cloud expert about the top issues users face when securing data in the cloud.
The attack allows snooping of data from environments that are highly secure or air-gapped, using infrared signals from smart bulbs.
Several developer tools capture a screen as an app crashes and send it to a third-party server creating a risk of corporate data leakage.
Facebook failed to fully sanitize error data returned by a public facing web app.
A Windows task scheduler API function does not check permissions – so any potential local bad actor can alter them to gain elevated privileges.
The first half of 2018 saw an uptick in fileless malware attacks and a downturn in ransomware attacks, for now.
Adobe issues a second unscheduled update this month to address a bug with a publicly available proof-of-concept code in the wild.