Anthem, Apple and the Pentagon: A Data-Breach Cornucopia
Like pumpkin spice and turning leaves, data breaches have become a theme for the fall. This season is shaping up to be no exception, with Read More
Like pumpkin spice and turning leaves, data breaches have become a theme for the fall. This season is shaping up to be no exception, with Read More
Eight D-Link routers in the company’s small/home office “DWR” range are vulnerable to complete takeover – but the vendor said it is planning on only Read More
An novel post-intrusion attack technique allows hackers to hijack a Windows system component called RID, allowing the adversaries to assign administrative privileges to “guest” and other Read More
The massive NotPetya ransomware outbreak that crippled organizations around the world last year turns out to have links to the Industroyer backdoor, which targets industrial Read More
What are utility and power companies, and federal agencies, doing to ready themselves for potential ransomware attacks? Threatpost discusses. Read More
Facebook plans to expand its content-policing on its site, aiming to crack down on profiles and pages that it deems are aimed at voter suppression Read More
Researchers have found that a popular Internet of Things real-time operating system – FreeRTOS – is riddled with serious vulnerabilities. The bugs could allow hackers Read More
At least 33 percent of the security issues found in industrial control systems (ICS) are rated as being of high or critical risk. FireEye iSIGHT Read More
Threatpost’s editors discuss the top news of this week. Read More
Microsoft patched a zero-day in its JET Database Engine this week – but the patch was incomplete, according to researchers at 0patch. The company has Read More