Security News
Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation flaw into their Intel-based products.
Grab those patches while Chipzilla updates its manuals Linux, Windows, macOS, FreeBSD, and some implementations of Xen have a design flaw that could allow attackers to, at best, crash Intel and...
Computer recovery code plays double agent on users LoJack software, designed to rat on computer thieves, appears to be serving a double purpose by also working with a Russian state-sponsored hacking team.…
Crypto-mining Malware Exposes Organizations to a Host of Monetary and Reputational Risks read more
A vulnerability affecting emergency alert systems supplied by ATI Systems, one of the leading suppliers of warning sirens in the USA, could be exploited remotely via radio frequencies to activate...
A massive malware outbreak that last week infected nearly half a million computers with cryptocurrency mining malware in just a few hours was caused by a backdoored version of popular BitTorrent...
How soon will we see our home, office or industrial robots being hijacked and held ransom by attackers? If they dedicate their efforts to research, that day may come sooner rather than later....
Malicious actors have injected themselves into ongoing email exchanges in highly targeted spear-phishing attacks aimed at entities across the world, Palo Alto Networks said on Thursday. read more
Over 4,000 insecure Elasticsearch servers have been hosting the point-of-sale malware Alina and JackPoS.
A new phishing campaign has been spotted hitting LinkedIn users via direct messages and the LinkedIn InMail feature. They are sent from legitimate LinkedIn Premium accounts that have been hijacked...