A LockBit 3.0 ransomware affiliate is using phishing emails that install the Amadey Bot to take control of a device and encrypt devices. According to a...
Lenovo has fixed two high-severity vulnerabilities impacting various ThinkBook, IdeaPad, and Yoga laptop models that could allow an attacker to deactivate UEFI Secure Boot. UEFI Secure...
A critical vulnerability arising from improper input validation has been addressed in XMLDOM, the JavaScript implementation of W3C DOM for Node.js, Rhino, and browsers. The flawed...
A security researcher has disclosed a CSS injection flaw in Acronis software which could be abused for data theft. On November 4, ‘Medi’ (under the alias...
Cybersecurity firm Recorded Future identified mis- and disinformation campaigns suggesting that voting machines from three major companies “will be used to falsify the results of the...
New guidance from the federal agencies—and major companies serving the government—tries to distinguish between the security duties of software developers, suppliers and consumers. Software suppliers have...
Inaugural CISA director Chris Krebs expressed concern about the spread of election misinformation as Twitter changes up its user verification process. Republican lawmakers need to forcefully...
A bug in Ember.js, a JavaScript framework for building Node.js web applications, allowed attackers to stage prototype pollution attacks against the host server. Prototype pollution attacks...
In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley...
As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions and services as well...
Recent Comments