The theft of 26 million card records from an underground site offers valuable intel for banks.
A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trump’s official campaign website.
Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices.
The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit.
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.
Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.
Three different loaders and two payloads are hiding in audio files.
A worm with a randomized propagation method is spreading via the popular container technology.
Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.
For many security decision-makers, the real challenge is communicating the ongoing IR process to their management.
A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.
A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.
Researchers create digital dossiers of mobile users scraped from Tor network traffic.
Unknown, vulnerable systems are present in nearly every ship environment that researchers have pen-tested.
A fake website purports to enable iPhone users to download an iOS jailbreak - but ultimately prompts them to download a gaming app and conducts click fraud.
The bug allows users to bypass privilege restrictions to execute commands as root.
The attack left customers unable to access key services for shipping and mailing, the company said.
Deepfake technology is becoming easier to create – and that’s opening the door for a new wave of malicious threats, from revenge porn to social-media misinformation.
The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government.
Without naming Huawei, the EU warns on state-backed 5G suppliers.
The First Stop For Security NewsSubscribe to Alerts feed