With social media becoming more relevant to businesses today, organizations can take a proactive stance to secure it and even make it safer for everyone else connected to it.
Criminal sellers are peddling ready-to-use ATM malware in underground markets for hacking into banks. In this report, we discuss how criminals advertise and even provide instructions on how to pull off a digital heist.
Industrial facilities have been increasingly reliant on the industrial internet of things (IIoT) but these facilities also have to defend against new threats that take advantage of weaknesses and other attack vectors that come with the adoption of new technol
The Silex malware quickly spread and wiped IoT devices’ firmware. The malware, which only operated for a day or so, has already managed to brick thousands of IoT devices.
Kubernetes announced the discovery of CVE-2019-11246, a high-severity vulnerability affecting the command-line interface kubectl, during an ongoing third-party security audit.
The relatively new ransomware Sodinokibi is already using an array of vectors to infect victims. Aside from using spam and phishing emails, the group behind this malware continues to add more delivery methods to their arsenal.
Dell urges users to update the vulnerable SupportAssist tool built into its business and home machines. The privilege escalation vulnerability could allow hackers control over Dell computers running Windows, if left unpatched.