Attackers Actively Exploiting Realtek SDK Flaws
Multiple vulnerabilities in software used by 65 vendors under active attack. [...]
Multiple vulnerabilities in software used by 65 vendors under active attack. [...]
The North Korea-linked APT group leverages known Internet Explorer vulns for watering-hole attacks. [...]
COVID-19-related exploitation and abuse is on the rise as vaccine data opens new frontiers for threat actors. [...]
The botnet cryptominer has already compromised 1,000-plus clouds since June. [...]
Computing giant tries to reassure users that the tool won’t be used for mass surveillance. [...]
Data theft, insider threats and imposters accessing sensitive customer data have apparently gotten so bad inside Amazon, the company is considering rolling out keyboard-stroke monitoring for its customer-service reps. A confidential memo from inside Amazon explained that customer service credential abuse and data theft was on the rise, according …
Illicit underground marketplace relaunches years after takedown. [...]
Despite a lack of evidence, the National Security Agency will investigate whether the Fox host was illegally targeted. [...]
John Deere security bugs could allow cyberattackers to damage crops, surrounding property or even people; impact harvests; or destroy farmland for years. [...]
Researchers have found an entirely new attack vector for eavesdropping on Zoom and other virtual meetings. [...]
Zoom’s security lesson over end-to-end encryption shows the costs of playing cybersecurity catchup. [...]
Out of eight agencies, four were given D grades in a report for the Senate, while the Feds overall got a C-. [...]
Fake aerobics-instructor profile delivers malware in a supply-chain attack attempt from TA456. [...]
Mass email distribution service compromise mirrors earlier Nobelium attacks. [...]
Agency warns attackers targeting teleworkers to steal corporate data. [...]
Employee email takeover exposed personal, medical data of students, employees and patients. [...]
No More Ransom is collecting decryptors so ransomware victims don’t have to pay to get their data back and attackers don’t get rich. [...]
No More Ransom is collecting decryptors so ransomware victims don’t have to pay to get their data back and attackers don’t get rich. [...]
A comment spammer flooded Babuk’s new ransomware forum with gay orgy porn GIFs and demanded $5K in bitcoin. [...]
Targets of Discord malware expand far beyond gamers. [...]
Expected cyberattacks on Tokyo Olympics likely include attempts to hijack video feeds, the Feds warn. [...]
Critical ICS vulnerabilities can be exploited through leading cloud-management platforms. [...]
Researchers are skeptical that much will come from calling out China for the Microsoft Exchange attacks and APT40 activity, but the move marks an important foreign-policy change. [...]
Hackers are stealing the identities of those lost in the condo-collapse tragedy. [...]
An analysis of criminal forums reveal what publicly known vulnerabilities attackers are most interested in. [...]