Late last December we started getting a distress call from our forum patrons. Patrons were experiencing ads that were opening via their default browser out of nowhere. The odd...
Impersonating Microsoft to phish for account credentials continues to be a powerful technique because it’s a way for attackers to insert themselves into normal business workflows....
A security researcher has found a malicious Chrome extension in the wild abusing the Chrome Sync process. Threat actors have discovered they can abuse the Google...
Executive Summary In December 2020, Unit 42 researchers observed attempts to exploit CVE-2020-25213, which is a file upload vulnerability in the WordPress File Manager plugin. Successful exploitation...
Walmart and Amazon are continuing to sell faulty smart doorbells and cameras filled with vulnerabilities that could expose customers’ sensitive information, according to research published Thursday....
Cerber was once the most common form of ransomware – and now it’s back, years after it’s heyday. A form of ransomware that was once the...
Criminal gangs often use multiple ransomware strains and jump ship from one RaaS (Ransomware-as-a-Service) to another, seeking better deals. A report published today by blockchain investigations...
The modern IT organization has a wide variety of responsibilities and competing priorities. As a result, cybersecurity is often overlooked in favor of projects that have an immediate...
Officials described their goals as they begin implementing the DOD’s enterprisewide data strategy. As the Defense Department shifts to become the data-centric organization laid out in...
A security researcher figured out a way to hack older Nespresso coffee machine smart cards in order to obtain virtually unlimited free drinks. The hack, developed...