Security News
A slew of vulnerabilities affecting the baseboard management controllers (BMCs) of Supermicro servers could be exploited by remote attackers to gain access to corporate networks, Eclypsium...
ObserveIT, the leading insider threat management platform with more than 1,900 customers around the world, announced the launch of its newest solution, ObserveIT 7.7. The latest release enhances...
In addition to employing a fileless attack technique, the Ursnif Trojan has been using CAB files to compress harvested data before exfiltration in recent attacks, Cisco Talos security researchers...
Google has rolled out new options for the G Suite alert center, to help administrators battle phishing emails more efficiently and spot data export operations initiated by attackers. The new...
Researchers with software risk measurement and management company Checkmarx were able to create two mobile applications that abuse the functionality of smart bulbs for data exfiltration. read more
But Forensic Investigation Shows Attackers Had Exfiltration Tools in PlaceAustralian human resources software developer PageUp says it has found "no specific evidence" that attackers removed data,...
Researchers have demonstrated that the near-field communication (NFC) protocol can be used to exfiltrate small amounts of data, such as passwords and encryption keys, over relatively long...
The free online office suite software is used by more than 30 million people and is a ripe target for criminals.
A group of researchers from Queen’s University (Canada) have proposed a new approach for keeping important documents safe: creating so many believable fakes that attackers are forced either to...
But Old Error Logs Contained Clear Text of Incorrect PasswordsHuman resources software developer PageUp says it doesn't appear that personal data exposed in a malware attack was actually removed...