Mobile-First Phishing Kit Targets Verizon Customers
The kit’s authors demonstrate a knowledge of Verizon’s infrastructure.
The kit’s authors demonstrate a knowledge of Verizon’s infrastructure.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
White hat hacker reverse engineers financial apps and finds a treasure trove of security issues.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Researchers have seen March Madness-related phishing scams, fake domains and adware spike as cybercriminals take a pass at tournament viewers.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Workplaces have become highly connected. Even a small business could have dozens of devices in the form of desktops, mobile devices, routers, and even smart appliances as part of its IT infrastructure. Unfortunately, each of these endpoints can now be a weak link that hackers could exploit. Hackers constantly probe networks for vulnerable endpoints to…
In today’s world, data plays a crucial role in the success of any organization, but if left unprotected, it could be a cybercriminal’s dream come true. Poorly protected MongoDB, CouchDB, and Elasticsearch databases recently got a lot more attention from cybersecurity firms and media lately. More than half of the known cases of massive data…
A critical Rockwell Automation flaw could be exploited to manipulate an industrial drive’s physical process and or even stop it.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
An exploit would allow an attacker to establish a persistent backdoor for ongoing remote access.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Magento patched 37 flaws Thursday, including a stored cross-site scripting (XSS) vulnerability that could have let an attacker take over a site.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Users of the conferencing platform should update immediately.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Researchers at Black Hat Asia said that Intel VISA, an undocumented testing tool, can be abused using previously-disclosed vulnerabilities.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea