VMware has patched a zero-day bug that was disclosed in late November – an escalation-of-privileges flaw that impacts Workspace One and other platforms, for both Windows...
A Google researcher found flaws in Apple’s AWDL protocol that would have allowed for a complete device takeover. A HACK THAT let an attacker take full...
A computer hacker who stole information from Nintendo and was also caught with child pornography on his computer was sentenced Tuesday to three years in prison....
A BEC tactic may go unnoticed if organizations fail to sync their web-based email clients with their desktop-based clients. (Microsoft) The FBI this week made public...
Information Commissioner’s Office struggling to recoup data breach debts, report suggests Up to 68% of fines issued by the UK’s Information Commissioner’s Office (ICO) since January...
A security researcher has earned a $3,000 bug bounty by achieving site-wide cross-site request forgery (CSRF) on job-hunting website Glassdoor. By exploiting the vulnerability, attackers could take control of...
Always-on virtual assistants including Amazon Alexa are enabling side-channel attacks to be taken to the next level. Smart speaker-enabled smart devices can infer a surprisingly large amount of...
Interpol has warned of a potential increase in cybercrime scams exploiting the news that a Covid-19 vaccine has been approved for use in the UK. Yesterday (December 2),...
Program managers said the summer will bring data quality checks. By this time next year, officials at the Cybersecurity and Infrastructure Security Agency plan to offer...
Organizations mostly monitor what they already know about, leaving unknown assets unprotected and open to attackers CyCognito announced new research in partnership with Enterprise Strategy Group (ESG)...