The First Stop For Security News
Updated: 4 min 27 sec ago
Consumer router models allowed authenticated users to take unrestricted remote control over TL-WR940N and TL-WR941ND routers.
Researchers said that they discovered new Mirai samples in February 2019, capable of infecting devices powered by a broadened range of processors.
Three recent spam campaigns are pretending to be from ADP and Paychex; in reality, the malicious emails are spreading the TrickBot trojan.
The surveillance tool was signed with legitimate Apple developer certificates.
Chris Vickery with UpGuard, who discovered two datasets exposing millions of Facebook records, discusses his findings and the implications of data collection with Threatpost.
Cisco repatched its RV320 and RV325 routers against two high-severity vulnerabilities, but at the same time reported two new medium-severity bugs with no fixes.
The 74 cybercrime groups were offering illicit services - from email spamming tools to stolen credentials - right on Facebook's platform.
Three waves of DNS hijacking attacks against consumer routers have been linked back to Google Cloud Platform abuse.
Spam campaign features obfuscated .zipx archive that unpacks LokiBot attack.
No. 4 global phone maker, Xiaomi, preinstalled a security app called ‘Guard Provider’ that had a major flaw.
After two databases were discovered leaking Facebook data, Facebook and Amazon are both pointing fingers - but researchers say the onus lies on all parties involved as data collection continues to grow.
Have your business try Cynet's Free Threat Assessment that checks for malware, C&C connections, data exfiltration, phishing link access, user credential thefts attempts, etc.
Business email compromise group London Blue is back with evolved email domain spoofing tactics and a newfound interest in targets in Asia.
The Security Analyst Summit 2019 heads to Singapore where elite researchers, top cybersecurity firms and global law enforcement agencies fight cybercrime.
Nvidia has patched eight high-severity flaws in its Tegra processors, which could enable denial of service and code execution.
Researchers say that two publicly exposed dataset are leaking Facebook data- from user names to plaintext passwords.
Maximizing your security investment starts with hiring the right talent, harvesting data, spotting trends in logs and more.
The OceanLotus APT is using two new loaders which use steganography to read their encrypted payloads.
Attackers these days want to ‘own’ your entire system, including partners and suppliers.
The kit's authors demonstrate a knowledge of Verizon's infrastructure.