A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.
Read moreUK Sets Up Fake Booter Sites To Muddy DDoS Market
March 29 2023The United Kingdom's National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is...
Read moreIn cyberattacks against the US, South Korea, and Japan, the group (aka APT43 or Thallium) is using advanced social engineering and cryptomining tactics that set it apart from other...
Read moreThinking of trying a bit of DDoSsing to get a feel for life at the fringes of the Dark Side? Don't do it!
Read moreA technique, dubbed the "Near-Ultrasound Inaudible Trojan" (NUIT), allows an attacker to exploit smartphones and smart speakers over the Internet, using sounds undetectable by humans.
Read moreIoT risk and security must get more attention from vendors and support from the marketplace.
Read moreSecurity Vulnerabilities in Snipping Tools
March 28 2023Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images.
Read moreHow CISOs Can Reduce the Danger of Using Data Brokers
March 28 2023Without proof that it was collected legally, purchased data can threaten an enterprise's security compliance and may expose the company to litigation.
Read moreGot an older iPhone that can't run iOS 16? You've got a zero-day to deal with! That super-cool Studio Display monitor needs patching, too.
Read more
Recent Comments