It has been reported that a team of security researchers found they could tap into Webex and Zoom video meetings because many…
Browsing: Malware and Vulnerabilities
Many cybersecurity professionals mistakenly believe virtual desktop infrastructure (VDI) is an effective way to combat cybercriminals, or at minimum slow…
Hagai Katz, head of Government Sector at Check Point explores how nation states can and should prevent cyberattacks against their…
It has been reported that concerns that planes could be targeted in cyberattacks are prompting U.S. officials to re-energize efforts to identify…
An attack campaign targeting primarily the U.S. and Europe is leveraging two legitimate tools, the Node.js framework, and WinDivert, to…
It has been reported that a new vulnerability in Apple’s iOS operating system is sitting on hundreds of millions of iPhones, iPads and…
In the initial years of the public cloud, security was cited as the primary reason not to upload sensitive data…
Hackers are currently exploiting an unpatched vulnerability in the Rich Reviews WordPress plugin for malvertising campaigns. Although the plugin was…
Iran’s government-backed hackers are trying to infect US military veterans with malware with the help of a malicious website, researchers…
It has been reported the infamous Emotet malware has started a new spam campaign that pretends to be a scanned copy…