Zoom Addresses Vanity URL Zero-Day
Amazon-Themed Phishing Campaigns Swim Past Security Checks
Threat Actors Introduce Unique ‘Newbie’ Hacker Forum
You Can Now Use Binary Log Checksums with Group Replication
Group Replication enables you to create fault-tolerant systems with redundancy by replicating the system state to a set of servers. Even if some of the servers subsequently fail, as long it is not all or a majority, the system is still available.…
The Streaming Wars: A Cybercriminal’s Perspective
Cyber threats aren’t relegated to the world of big businesses and large-scale campaigns. The most frequent attacks aren’t APTs and massive data breaches—they’re the daily encounters with malware and spam by everyday users. And, one of the areas where we’re most vulnerable is entertainment—particularly when we’re so used to finding everything and anything we want…
LokiBot Redux Attacks Massive List of Common Android Apps
Twitter Elite Accounts Are Hijacked in Unprecedented Cryptocurrency Scam
Brazil’s Banking Trojans Go Global
Automatic Schema Synchronization in NDB Cluster 8.0: Performance Schema Tables
The Automatic Schema Synchronization mechanism, detailed in a two part series: part 1 and part 2, automatically detects and synchronizes mismatches in metadata between NDB Dictionary and MySQL Server’s Data Dictionary. Information about the mechanism is exposed through different MySQL Server status variables.…