Rooting Malware Is Back. Here’s What to Look Out For. | Threatpost
Over the last several years, as the Android ecosystem matured, widely-distributed malware with rooting capabilities has become rare. But its rarity doesn’t mean it’s not Read More
Over the last several years, as the Android ecosystem matured, widely-distributed malware with rooting capabilities has become rare. But its rarity doesn’t mean it’s not Read More
The FBI admitted on Monday morning that an attacker exploited a flaw in how an agency messaging system is configured: a flaw that let an Read More
Costco has discovered a payment card skimming device at one of its retail stores and has sent out notification letters informing customers that their card Read More
A pair of PlayStation 5 breaches shows the consoles don’t have protection from attackers taking over its most basic functions. Both exploits were posted on Read More
Newly surfaced malware that is difficult to detect and written in Google’s open-source programming language has the potential to exploit millions of routers and IoT Read More
A new business email compromise (BEC) campaign targeting Microsoft 365 users is using a range of sophisticated obfuscation tactics within phishing emails that can fool Read More
From encrypting communications to fencing ill-gotten gains on underground sites, organized crime is cashing in on the digital revolution. The latest organized crime threat assessment Read More
A recent survey by Fortinet revealed that two-thirds of organizations had been the target of at least one ransomware attack – and 85 percent are Read More
Security operations centers (SOCs) and threat analysts are struggling with ever-increasing and growing cyberthreats. Massive volumes of data created every second lead to new vulnerabilities Read More
The U.K.’s largest fishing retailer, Angling Direct, experienced a system breach on Nov. 5 that resulted in their domain being redirected to Pornhub. The jokes Read More