Zoom Screen-Sharing Glitch ‘Briefly’ Leaks Sensitive Data
A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords. [...]
A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords. [...]
The newly discovered steganography method could be exploited by threat actors to obscure nefarious activity inside photos hosted on the social-media platform. [...]
The popular learning-management system for teacher-student communication is rife with SQL-injection vulnerabilities. [...]
The Cisco security vulnerability exists in the RV132W ADSL2+ Wireless-N VPN Routers and RV134W VDSL2 Wireless-AC VPN Routers. [...]
The ‘young mastermind’ of the Twitter hack will serve three years in juvenile detention. [...]
The American Rescue Act is the latest zeitgeisty lure being circulated in an email campaign. [...]
A new Mimecast update reveals the SolarWinds hackers accessed several "limited" source code repositories. [...]
Researchers say China-linked APTs lure victims with bogus Huawei career pages in what they dub ‘Operation Diànxùn’. [...]
Insider Risk Management builds a framework around the new paradigm of "risk tolerance," aiming to give security teams the visibility and context around data activity to protect that data, without putting rigid constraints on users. [...]
A major spike of attacks against higher ed, K-12 and seminaries in March has prompted the FBI to issue a special alert. [...]
A Florida high-school student faces jail time for rigging her school's Homecoming Queen election. [...]
A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices, as well as newly-discovered flaws in unknown IoT devices. [...]
Public proof-of-concept (PoC) exploits for ProxyLogon could be fanning a feeding frenzy of attacks even as patching makes progress. [...]
Researchers from Sucuri discovered the tactic, which creatively hides malicious activity until the info can be retrieved, during an investigation into a compromised Magento 2 e-commerce site. [...]
Google has released the side-channel exploit in hopes of motivating web-application developers to protect their sites. [...]
At SafeDNS, we see three entangled hurdles for MSPs in 2021 and the coming years— tied with the current economic uncertainty and somewhat linked to the pandemic. [...]
A survey from Intel shows that most organizations prefer tech providers to have proactive security, but few meet security expectations. [...]
A year after COVID-19 was officially determined to be a pandemic, the methods and tactics used by cybercriminals have drastically changed. [...]
The use-after-free vulnerability is the third Google Chrome zero-day flaw to be disclosed in three months. [...]
Unpatched Schneider Electric PowerLogic ION/PM smart meters are open to dangerous attacks. [...]
The threat group behind the Sodinokibi ransomware claimed to have recently compromised nine organizations. [...]
Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled reseller. [...]
A legitimate binary for creating shortcut keys in Windows is being used to help the malware sneak past defenses, in a rash of new campaigns. [...]
As attacks double every hour, hackers are exploiting vulnerable Microsoft Exchange servers and installing a new family of ransomware called DearCry. [...]
The multinational brewing company did not say what type of incident caused a ‘systems outage,’ but it's investigating and working to get networks back online. [...]