16 hours 30 minutes ago
A slip-up by a malware author has allowed researchers to taxonomize three ransomware variations going by different names.
Nate Nelson
16 hours 45 minutes ago
The Google Project Zero researcher found a bug in XML parsing on the Zoom client and server.
Sagar Tiwari
17 hours 2 minutes ago
2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur.
Elizabeth Montalbano
1 day 15 hours ago
Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.
Sagar Tiwari
2 days 17 hours ago
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.
Threatpost
2 days 17 hours ago
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.
Elizabeth Montalbano
5 days 17 hours ago
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.
Threatpost
5 days 18 hours ago
More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access.
Elizabeth Montalbano
6 days 16 hours ago
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.
Elizabeth Montalbano
1 week ago
The U.S. Department of Justice indicts middle-aged doctor, accusing him of being a malware mastermind.
Nate Nelson
1 week ago
Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.
Elizabeth Montalbano
1 week ago
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.
Sagar Tiwari
1 week 1 day ago
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.
Sagar Tiwari
1 week 1 day ago
Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
Elizabeth Montalbano
1 week 2 days ago
Microsoft's May Patch Tuesday update is triggering authentication errors.
Sagar Tiwari
1 week 5 days ago
An account promoting the project—which offers a range of threat activity from info-stealing to crypto-mining to ransomware as individual modules—has more than 500 subscribers.
Elizabeth Montalbano
1 week 6 days ago
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks.
Nate Nelson
1 week 6 days ago
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.
Tony Lauro
1 week 6 days ago
The stealthy, feature-rich malware has multistage evasion tactics to fly under the radar of security analysis, researchers at Proofpoint have found.
Elizabeth Montalbano
Checked
2 hours 31 minutes ago
The First Stop For Security News
Subscribe to Threatpost feed