Unknown threat actors are using previously undetected malware to backdoor macOS devices and exfiltrate information in a highly targeted series of attacks. ESET researchers first spotted...
https://player.vimeo.com/video/728065619?h=1540dc7163&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In this Help Net Security video, Tony Lambert, Senior Malware Analyst at Red Canary, talks about how adversaries’ favorite tools are legitimate tools that are used...
https://player.vimeo.com/video/730902107?h=1be71e0903&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 At the recent meeting of the North Atlantic Council in Madrid, NATO heads of state agreed to boost resilience to cyber and hybrid threats. NATO members will strengthen...
There are critical blind spots in most security solutions today that make it nearly impossible to detect and prevent lateral movement attacks. Understanding the fundamentals of...
A Panaseer survey of global insurers across the UK and US found that 82% are expecting the rise in premiums to continue, with 74% of insurers...
Security researchers claim to have uncovered serious security shortcomings in the systems of identity provider Okta. Identity and access management specialist Authomize went public with four supposed...
A new release of Tor Browser enables users to circumvent location-specific censorship to connect to the anonymous web browser more easily. Introduced in version 11.5, Connection...
An unauthenticated arbitrary object instantiation vulnerability in LDAP Account Manager (LAM) has been discovered during an internal penetration test. LAM is a PHP web application for...
The office will inform other efforts to come as the agency grows its international presence. The Cybersecurity and Infrastructure Security Agency is opening an office in...
The FBI has warned today that cybercriminals use fraudulent cryptocurrency investment applications to steal funds from US investors. So far, the US federal law enforcement agency...