Zoom Exploit on MacOS
August 17 2022This vulnerability was reported to Zoom last December:
The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions in order...
Read more
This vulnerability was reported to Zoom last December:
The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions in order...
Read more
The tamper protection feature detects attempts to modify files and processes for Microsoft Defender for Endpoints on macOS.
Read more"Seaborgium" is a highly persistent threat actor that has been targeting organizations and individuals of likely interest to the Russian government since at least 2017, company says.
Read moreOmdia Senior Analyst Hollie Hennessy goes over her first experience of DEF CON as a woman in cybersecurity.
Read moreSouth Staffordshire in the UK has acknowledged it was targeted in a cyberattack, but Clop ransomware appears to be shaking down the wrong water company.
Read moreJust as one crop of malware-laced software packages is taken down from the popular Python code repository, a new host arrives, looking to steal a raft of data.
Read moreEarlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The missive alleged that an auction on the site for data...
Read moreFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreWanted - Reward Offered - Five unknown individuals (plus a man with a weird hat)
Read moreCybercrime has been funded with cryptocurrency, but the valuation of various digital currencies has dropped by more than two-thirds and cybercriminals are feeling the pinch.
Read more
Recent Comments