Jump to content
Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble
Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble

All Activity

This stream auto-updates     

  1. Last week
  2. The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks. View the full article
  3. There are many areas of the election process that criminal hackers can target to influence election results. View the full article
  4. Versions of Nvidia GeForce Experience for Windows prior to are affected by a high-severity bug that could enable code execution, denial of service and more. View the full article
  5. An elaborate set of redirections and hundreds of URLs make up a wide-ranging tech-support scam. View the full article
  6. Up to 50,000 Office 365 users are being targeted by a phishing campaign that purports to notify them of a "missed chat" from Microsoft Teams. View the full article
  7. The Feds have published a Top 25 exploits list, rife with big names like BlueKeep, Zerologon and other notorious security vulnerabilities. View the full article
  8. The majority of the bugs in Cisco’s Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software can enable denial of service (DoS) on affected devices. View the full article
  9. Over half of Oracle's flaws in its quarterly patch update can be remotely exploitable without authentication; 65 are critical, and two have CVSS scores of 10 out of 10. View the full article
  10. The memory-corruption vulnerability exists in the browser’s FreeType font rendering library. View the full article
  11. The out-of-band patches follow a lighter-than-usual Patch Tuesday update earlier this month. View the full article
  12. Amazon, Apple, Netflix, Facebook and WhatsApp are top brands leveraged by cybercriminals in phishing and fraud attacks - including a recent strike on a half-million Facebook users. View the full article
  13. A set of address-spoofing bugs affect users of six different types of mobile browsers, with some remaining unpatched. View the full article
  14. The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it. View the full article
  15. DOJ charges six Russian nationals for their alleged part in the NotPetya, Ukraine power grid and Olympics cyberattacks. View the full article
  16. This post is originally published on Designmodo: Win-Back Email Newsletters: Engaging Examples for Marketing You may have the best product in the world, provide the most memorable user experience, and put your heart and soul into relationships with the customers; but according to statistics, almost 25% of subscribers will leave eventually. It may happen … For more information please contact Designmodo View the full article
  17. Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours. View the full article
  18. A new threat report shows that APTs are switching up their tactics when exploiting Microsoft services like Exchange and OWA, in order to avoid detection. View the full article
  19. In both cases, cybercriminals claim to have reams of information for the popular gaming titles. View the full article
  20. Earlier
  21. The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution. View the full article
  22. Google's Threat Analysis Group sheds more light on targeted credential phishing and malware attacks on the staff of Joe Biden's presidential campaign. View the full article
  23. Fortinet researchers are seeing a pivot in the spear-phishing and phishing lures used by cybercriminals, to entice potential job candidates as businesses open up. View the full article
  24. The move is a distinct change in direction for the app, which has been criticized and even banned for its security practices. View the full article
  25. Adobe says the two critical flaws (CVE-2020-24407 and CVE-2020-24400) could allow arbitrary code execution as well as read or write access to the database. View the full article
  26. In-game features of the just-released FIFA 21 title give scammers easy access its vast audience. View the full article
  27. After backlash over false marketing around its encryption policies, Zoom will finally roll out end-to-end encryption next week. View the full article
  1. Load more activity