LinkedIn Spear-Phishing Campaign Targets Job Hunters
Fake job offers lure professionals into downloading the more_eggs backdoor trojan. [...]
Fake job offers lure professionals into downloading the more_eggs backdoor trojan. [...]
The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two.ZIP files attached. [...]
Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it. [...]
In this roundtable, security experts focus on smaller businesses offer real-world advice for actionable ways to shore up defenses using fewer resources. [...]
Activision is warning that cyberattackers are disguising malware -- a remote-access trojan (RAT) -- in cheat programs. [...]
Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize. [...]
Cyberattackers have set up a website for a fake company called SecuriElite, as well as associated Twitter and LinkedIn accounts. [...]
The Cart Crasher gang is testing stolen payment cards while cleaning ill-gotten funds. [...]
Telecommuting social-media manager for the U.S. Strategic Command left the laptop open and unsecured while stepping away. [...]
Predator-ranked players on Xbox console game version rigged matches with DDoS attacks. [...]
The server for the web-application scripting language was compromised on Sunday. [...]
Younger employees and caregivers report more stress than other groups-- and more shadow IT usage. [...]
The incident, which forced the company to disconnect its systems, caused significant business disruption. [...]
The social-media giant took down legions of fake profiles aimed at spreading espionage malware. [...]
New research shows that while all sectors are at risk, 70 percent of manufacturing apps have vulnerabilities. [...]
Vast swathes of companies were likely compromised before patches were applied, so the danger remains. [...]
TikTok’s source code is in line with industry standards, security researchers say. [...]
A former IT contractor is facing jailtime after a retaliatory hack into a company’s network and wiping the majority of its employees’ Microsoft Office 365 accounts. [...]
A cyberattacker taunted the site about open security vulnerabilities, prompting a code review. [...]
Attackers can leverage the critical Adobe ColdFusion flaw to launch arbitrary code execution attacks. [...]
Attackers move on new CEOs, using transition confusion to harvest Microsoft credentials. [...]
Fintech security provider Fiserv acknowledges it used unregistered domain as default email. [...]
A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords. [...]
The popular learning-management system for teacher-student communication is rife with SQL-injection vulnerabilities. [...]
The Cisco security vulnerability exists in the RV132W ADSL2+ Wireless-N VPN Routers and RV134W VDSL2 Wireless-AC VPN Routers. [...]