Podcast: Plugging Leaky Data in the Cloud
Threatpost talks to a Google Cloud expert about the top issues users face when securing data in the cloud. Read More
Threatpost talks to a Google Cloud expert about the top issues users face when securing data in the cloud. Read More
While the rest of the U.S. tech industry is taking steps to assuage consumer concerns over privacy and data-harvesting, Yahoo is selling off the ability Read More
An “API-breaking” vulnerability has been uncovered that potentially exposes Android device systems data to rogue apps — information that could be very useful to bad Read More
A zero-day flaw recently disclosed in Microsoft’s Windows task scheduler could enable a bad actor to gain elevated privileges. The flaw, which was disclosed Monday Read More
Researchers are warning of a Chinese-language threat actor leveraging a wide array of Git repositories to infect vulnerable systems with Monero-based cryptomining malware. Researchers at Read More
Tuesday was a busy day on the data breach front. Air Canada said that a breach of around 20,000 mobile app users had exposed passport Read More
Adobe released a second unscheduled fix this month, this time for a flaw in its Creative Cloud desktop application that could lead to privilege escalation. Read More
There was a time when no one could predict the weather – the only way you knew if a blizzard or heat wave was coming Read More
The use of fileless malware in attacks continues to grow and now represents 42 out of 1,000 endpoint attacks, according to an analysis of 2018 Read More
Schneider Electric has released fixes for a slew of vulnerabilities that can be exploited remotely in two of its industrial control system products. The two Read More