Threatpost talks to Tenable CTO Renaud Deraison about the security risks behind smart cities.
A serious vulnerability was patched by developers behind Git that closes the door on a flaw that could lead to arbitrary code execution on a developer’s system.
The botnet operators behind two infamous trojans have banded together to gouge victims in a costly scheme.
Fortune 500 breaches seem to be a theme this week.
Google has rolled out its newest browser version (Chrome 67.0.3396.62) for Windows, Mac and Linux this week with new security fixes and biometric features.
The North Korean-sponsored actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files.
Two Canadian banks reported that they may be targets of a hack after fraudsters claimed that they electronically accessed personal and account information.
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash.
An exploit for the bypass vulnerability required an HTTP parameter pollution in a web application.