5G and IoT: How to Approach the Security Implications | Threatpost
When it comes to the next generation of mobile networks, 5G promises a more Internet of Things-friendly ecosystem with vast improvements over the current capabilities Read More
When it comes to the next generation of mobile networks, 5G promises a more Internet of Things-friendly ecosystem with vast improvements over the current capabilities Read More
A critical remote code execution (RCE) bug affecting default 5.x versions of vBulletin (CVE-2019-16759) is being actively exploited in the wild, allowing unauthenticated attackers to Read More
It sure is a difficult time to be a network defender. According to one industry report, as many as 85,000 malicious websites are launched daily, Read More
Endpoint Detection & Response (EDR) is the main mode of cybersecurity utilized by many organizations. Already recognized in 2012 as its own category, EDR was Read More
Data from McKinsey Insights suggests that many CISOs are uneasy about increasing dependence on SaaS applications and the security risks – real or perceived – Read More
A phishing campaign that takes advantage of Google’s ability to decode non-ASCII URL data on the fly is making the rounds – looking to fool Read More
Vimeo, the popular ad-free video platform, is facing a lawsuit that alleges it stored people’s facial biometrics without their consent or knowledge. The lawsuit, which Read More
An unpatched vulnerability in the Rich Reviews plugin for WordPress is putting an estimated 16,000 sites in danger of stored cross-site scripting (XSS) attacks. Sites Read More
Food delivery service DoorDash disclosed a data breach that affects almost 5 million customers, drivers and merchants using its platform. DoorDash, an on-demand food delivery Read More
Researchers are warning that a fake website – purporting to help U.S. military veterans search for jobs — actually links to installers that download malware Read More