A recent cryptomining campaign shows criminal ingenuity.
The spam campaign mostly targets victims in Turkey and Germany.
Chrome users are now automatically signed into the browser if they're signed into any other Google service, such as Gmail.
The human factor doesn't have to be an intangible when assessing cyber risks within a company.
There are currently no mitigations for the Firefox attack, a researcher told Threatpost.
Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch.
Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems.
The company said it has issued a patch for the issue, which has been ongoing since May 2017.
Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.
Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.
The threat actor's Android-focused cyber-arms package, dubbed Black Rose Lucy, is limited in reach for now, but clearly has global ambitions.
Vulnerability allowed an unauthenticated remote attacker to log in to a device at the time the system initially boots up.
The data breach, hard on the heels of the British Airways breach, shows that Magecart is quickly evolving and shows no signs of slowing down.
The research team said it has shared its findings with law enforcement and victims are being notified.
The three hackers behind the infamous Mirai botnet have been helping law enforcement take down cybercriminals across the globe.
Overall seven flaws were patched - including one critical vulnerability that could lead to arbitrary code execution.
Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.
A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.
A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices – from Mikrotik routers to dishwashers.
Outdated security practices made it simple to access other people's receipts for everything from traffic tickets to paying bail.