The “Prying-Eye” vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls. Researchers have discovered a vulnerability in the Zoom and Cisco Webex conference platforms...
Read moreAttackers Focus on More Disruptive Ransomware Infections
October 1 2019Details from a campaign tracked over the past five months show how cybercriminals are continuing to refine their strategies and attempting to adjust to victims’ resolve to not pay...
Read moreAttackers Focus on More Disruptive Ransomware Infections
October 1 2019Details from a campaign tracked over the past five months show how cybercriminals are continuing to refine their strategies and attempting to adjust to victims’ resolve to not pay...
Read more‘Harvesting Attacks’ & the Quantum Revolution
October 1 2019Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there’s a working quantum computer in five to ten years. The time to act...
Read more‘Harvesting Attacks’ & the Quantum Revolution
October 1 2019Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there’s a working quantum computer in five to ten years. The time to act...
Read moreMicrosoft Announces Ability to Force TLS Version Compliance
October 1 2019Transport Layer Security (TLS) can be critical for security, but it must be deployed in a current version. Microsoft now provides a mechanism for administrators to guarantee the right...
Read moreMicrosoft Announces Ability to Force TLS Version Compliance
October 1 2019Transport Layer Security (TLS) can be critical for security, but it must be deployed in a current version. Microsoft now provides a mechanism for administrators to guarantee the right...
Read moreHead Fake: Tackling Disruptive Ransomware Attacks
October 1 2019Within the past several months, FireEye has observed financially-motivated threat actors employ tactics that focus on disrupting business processes by deploying ransomware in mass throughout a...
Read moreHead Fake: Tackling Disruptive Ransomware Attacks
October 1 2019Within the past several months, FireEye has observed financially-motivated threat actors employ tactics that focus on disrupting business processes by deploying ransomware in mass throughout a...
Read moreHead Fake: Tackling Disruptive Ransomware Attacks
October 1 2019Within the past several months, FireEye has observed financially-motivated threat actors employ tactics that focus on disrupting business processes by deploying ransomware in mass throughout a...
Read more
Recent Comments