A full 98 percent of US enterprises have embarked on information governance (IG) projects, dramatically up from just 10 percent last year.
Browsing Author: Tara Seals
A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a critical RCE that could allow total system compromise.
Records for a mobile app that parents can use to monitor what their kids are doing online has been exposed in the latest Amazon Web Services cloud misconfiguration.
Analysis shows that the malware, previously a banking trojan focused on Android devices, has rapidly evolved just in the past month.
The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.
A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.
The Sun Team APT, likely linked to North Korea, uses Google Play and Facebook as attack vectors.
A team of academic researchers has demonstrated that it’s possible to closely mimic legitimate voice commands in order to carry out nefarious actions on these home assistants.
Threatpost talked to several security researchers about what’s changed in the past year.
The vulnerability allows an attacker to execute a malware or other payloads on a client machine by sending malicious messages from the DHCP server.