High-severity flaws plague Cisco’s Webex collaboration platform, as well as its RV routers for small businesses.
The June campaign was targeted and aimed at stealing online banking credentials.
Darren James, product specialist with Specops Software, warned that password resets, for example, are a particularly vexing issue for sysadmins, as they can often lockout end-users from their accounts.
Attackers use trusted entities to trick victims into giving up their corporate log-in details as well as to bypass security protections.
InvisiMole is back, targeting Eastern Europe organizations in the military sector and diplomatic missions with an updated toolset and new APT partnership.
A “very rare” malware has been used by an unknown threat actor in cyberattacks against two different Russian organizations in 2017.
The beautiful game is back on the pitch in the U.K. — and cyberattackers will be looking to take advantage of fans streaming the games.
Spreading via poisoned Google search results, this new version of Mac’s No. 1 threat comes with added stealth.
Microsoft report offers insight on how threat actors exploited COVID-19 across the globe.
Game theory has been used in cybersecurity to observe the nature of a cyber incident— where network defenders, attackers, and users, interact with each other and produce an outcome.