Cybercriminals have shifted their focus from individuals and smaller businesses to target governments, critical health infrastructure and …
Over the past several years, user misconfigurations of cloud storage infrastructure settings have led to a spate of high-profile security …
A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits …
CodeMeter 6.60 – ‘CodeMeter.exe’ Unquoted Service …
SPONSORED CONTENT: Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for …
Satellite internet communications are susceptible to eavesdropping and signal interception by far-flung attackers located in a different …
The FireEye Front Line Applied Research & Expertise (FLARE) Team attempts to always stay on top of the most current and emerging threats. …
US chipmaker Intel is investigating a security breach after earlier today 20 GB of internal documents, with some marked “confidential” or …
Researchers Peleg Hader and Tomer Bar of SafeBreach share details of the three vulnerabilities they found in Windows Print Spooler that …
Ten years after the game-changing Stuxnet attack was first discovered, a Windows printer program it exploited has been found to contain …
Security leaders and their organizations are under constant siege from cyberattacks. Although it’s a shocking figure, it shouldn’t be …
Twenty years ago, almost everything in the IT world was on-premises: hardware and software, including the tools you used to verify who your …
●●●
NVD
EXPLOITS
SECURELIST