Zoom Is Now a New Attack Vector – Of Course.
Dan Goodin of Ars Technica reports on a Zoom vulnerability. -Article
Dan Goodin of Ars Technica reports on a Zoom vulnerability. -Article
DH Kass of MSSP Alert reports on cyber-threats to remote workers. -Article
Sergiu Gatlan reports on new malware delivery method. -Article
Catalin Cimpanu of Zero Day reports on an attack targeting Google Authenticator app. -Article
Brien Posey of ITPro Today reports on old method being used to deliver new threats. -Article
Most of your clients and prospects already have IoT in their businesses—unfortunately, about 80% of it is unsecure. Since many businesses have not secured their IoT, hackers are able to breach their clients’ networks through their IoT devices. That is ...
Lindsey ODonnell of Threat Post reports on novel way malware is being spread. -Article
Susan Bradley of AskWoody reports on Microsoft's update methods. -Article
Electronic Frontier Foundation reports on searches of travelers mobile devices. -Article
Ionut Ilascu of Bleeping Computer reports on ODT Files being used as an attack vector. -Article.