Over the past month, threat actors have been using a relatively non-conventional approach to mount a flurry of distributed denial-of-service (DDoS) attacks: through TCP amplification.
Another company has disclosed that that they were hit by a ransomware attack, this time involving the encryption of the customer data of SmarterASP.net, a popular hosting service provider for ASP.NET.
We have developed a machine learning model called TrendX Hybrid Model that uses two training phases — pre-training and training — and allows us to correlate static and behavior features to improve detection rates and reduce false positives.
Researchers discovered a vulnerability in Amazon’s Ring Video Doorbell Pro that, if exploited, could allow a threat actor to get network or Wi-Fi credentials.
An Android bug allows threat actors to transfer a malicious application to a nearby Near Field Communication (NFC)-enabled device via the Android Beam.
Details on the proof-of-concept (PoC) exploit for two unpatched, critical remote code execution (RCE) vulnerabilities in the network configuration management utility rConfig have been recently disclosed.
Patch now: Two Chrome zero-days were reported, one of them actively exploited in a campaign. Meanwhile, BlueKeep was initially reported seen in the wild to install a malicious Monero miner.
Almost 4,000 domains and 62 phishing kit variants used to target Microsoft users were uncovered within an observation window of 262 days, according to new report.