Blog: In The News
You are here: Home \ Blog
Nigerian-based cybercriminals are growing more dangerous as they add sophisticated tools to their arsenal,  including complex remote access trojans, a new report reveals.
The actors behind this kind of code, whether they’re bent on sending a political message or simply wanting to cover their tracks after data exfiltration, have adopted various techniques to carry out those activities.
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security.
An attacker can gain man-in-the-middle access to inject a rogue executable file onto the phone.
The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack.
In total, Microsoft’s May Patch Tuesday roundup included 68 security patches, with 21 listed as critical, 45 rated important and two listed low in severity.
The flaws would leave the enterprise devices helpless to a range of remote threats, including the charms of the Reaper IoT botnet.
Adobe fixed critical vulnerabilities in Adobe Flash Player and Creative Cloud as part of its regularly scheduled May Security Bulletin, on Tuesday.
As companies continue to install the vulnerable version of Apache Struts behind the breach, Equifax has filed a clarification statement.
Tech-support scams took off during the year, while whaling/business email compromise was the main threat, accounting for losses of more than $675 million.
... 343536373839404142 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...