New research “Priority threat actors adopt Mirai source code” from Juniper Threat Labs shows how threat actors are adopting and…
Browsing: Malware and Vulnerabilities
A “nationally significant” vulnerability were discovered in Huawei equipment used in the UK’s telecommunications networks. Vulnerabilities are usually software design…
Now in its 17th year, Cybersecurity Awareness Month continues to play a critical role in raising awareness of the online…
Introduction to the New Age of Warfare It was in Amsterdam 1993 when presenting a paper at the Virus Bulletin…
COVID-19 has already forced major changes to the way we live our lives. Many of these may outlast the pandemic,…
Microsoft released an update for CVE-2020-1472 (now known as Zerologon) on August 11, 2020. The Elevation of Privilege vulnerability exists in the…
Security researchers at Check Point published research today, identifying a Remote Control Execution (RCE) vulnerability in Instagram. The attacker would only…
The U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA) over the past weekend issued a directive for…
Security researchers at Check Point just-published research, identifying a Remote Control Execution (RCE) vulnerability in Instagram. The attacker would only need…
CISA today warned of a substantial increase in the use of LokiBot “info stealer” malware by bad actors since July…