Apple Mail Zero-Click Security Vulnerability Allows Email Snooping
The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two.ZIP files attached. [...]
The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two.ZIP files attached. [...]
Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it. [...]
In this roundtable, security experts focus on smaller businesses offer real-world advice for actionable ways to shore up defenses using fewer resources. [...]
Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon. [...]
Activision is warning that cyberattackers are disguising malware -- a remote-access trojan (RAT) -- in cheat programs. [...]
John Hammond, security researcher with Huntress, takes a deep-dive into a malware's technical and coding aspects. [...]
Attackers are impersonating the stock-trading broker using fake websites to steal credentials as well as sending emails with malicious tax files. [...]
A vast majority of companies in a global survey from Microsoft report being a victim of a firmware-focused cyberattack, but defense spending lags, but defense spending lags. [...]
Some legacy models of QNAP network attached storage devices are vulnerable to remote unauthenticated attacks because of two unpatched vulnerabilities. [...]
The ransomware gang exfiltrated 40 gigabytes of data from the fashion house, including HR and salary details. [...]
Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize. [...]
Cyberattackers have set up a website for a fake company called SecuriElite, as well as associated Twitter and LinkedIn accounts. [...]
Google’s Pixel and Apple’s iPhone both in privacy hot seat for siphoning mobile device data without consent. [...]
The Cart Crasher gang is testing stolen payment cards while cleaning ill-gotten funds. [...]
Telecommuting social-media manager for the U.S. Strategic Command left the laptop open and unsecured while stepping away. [...]
Researchers uncover a credential-stealing campaign targeting genetic, neurology and oncology professionals. [...]
Ziggy joins Fonix ransomware group and shuts down, with apologies to targets. [...]
Publicly available cloud images are spreading Monero-mining malware to unsuspecting cloud developers. [...]
Current and former administration sources say the nation-state attackers were able to read the Homeland Security Secretary's emails, among others. [...]
A class-action suit in Florida accuses the tech giant of unlawfully intercepting communications by using session-replay software to capture the interaction of people visiting the corporate homepage Intel.com. [...]
Predator-ranked players on Xbox console game version rigged matches with DDoS attacks. [...]
There could be more than immediately meets the eye with this targeted attack group. [...]
The server for the web-application scripting language was compromised on Sunday. [...]
The post-SolarWinds EO could be issued as soon as next week, according to a report. [...]
Younger employees and caregivers report more stress than other groups-- and more shadow IT usage. [...]