Trend Micro researchers uncovered a new variant of the notorious Mirai malware that uses multiple exploits to target various routers and internet-of-things devices.
A year after a potentially critical vulnerability (CVE-2018-1002100) was found and patched in the popular open-source container orchestration system and DevOps tool Kubernetes, researchers discovered that the vulnerability can still be exploited.
For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start.
As manufacturing companies continue to adopt Industry 4.0, many environments could still be falling short on security with outdated systems, unpatched vulnerabilities, and unsecure files that leave them vulnerable to attacks.
More than 13,000 Internet Small Computer Systems Interface (iSCSI) clusters were found to be unsecured and accessible over the public internet due to their owners’ failing to password-protect them.
Personal health information of over 350,000 consumers were potentially compromised after nine employees of the Oregon Department of Human Services (DHS) fell victim to a phishing attack.