A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security. Researchers with Chronicle, the cybersecurity company and Alphabet subsidiary, today published...
Read moreLegal Threats Make Powerful Phishing Lures
May 23 2019Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued,...
Read moreLegal Threats Make Powerful Phishing Lures
May 23 2019Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued,...
Read moreThe city’s mayor says there’s no ‘exact timeline on when all systems will be restored.’ The city of Baltimore’s email system remains down today as it continues its recovery...
Read moreThe city’s mayor says there’s no ‘exact timeline on when all systems will be restored.’ The city of Baltimore’s email system remains down today as it continues its recovery...
Read moreWhile IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks. Consumer-grade Internet of Things (IoT) devices continue to...
Read moreWhile IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks. Consumer-grade Internet of Things (IoT) devices continue to...
Read moreAn AWS-hosted database was configured with no username or password required for access to personal data. How many Instagram influencers does it take to create a massive unplanned data...
Read moreAn AWS-hosted database was configured with no username or password required for access to personal data. How many Instagram influencers does it take to create a massive unplanned data...
Read moreSatan Ransomware Adds More Evil Tricks
May 22 2019The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully. The operators and developers behind a 2-year-old ransomware framework, dubbed...
Read more
Recent Comments