Security researchers uncovered a traffic distribution system (TDS) being advertised as a service in the dark web. Named “BlackTDS,” the TDS is used to deploy malware and redirect would-be victims to exploit kits.
A new cryptocurrency-mining operation they named RedisWannaMine was uncovered targeting database and application servers by exploiting the notorious EternalBlue.
Security researchers uncovered an attack vector that can enable attackers to circumvent Microsoft’s Code Integrity Guard (CIG) inject malicious libraries into applications.
A new research demonstrated a proof-of-concept attack they named “Mosquito,” which can exfiltrate data from online and air-gapped computers using speakers and headphones.
After monitoring and detecting suspicious domains—now what? Affected businesses should deactivate them so fraudsters won’t be able to use them for their schemes. Here's how it can be done.
MIT's recent research delved into 126,000 stories tweeted by around 3 million accounts from 2006 to 2017 and found that fake news spread faster and were more likely to be retweeted than true stories.
Researchers found US-based traffic systems vulnerable to data spoofing attacks, where smart intersections are tricked into indirectly causing traffic slowdowns.
The EU General Data Protection Regulation (GDPR) is weeks away. A Google paper on the right to be forgotten highlights challenges to GDPR compliance, particularly the right to erasure. What are the the implications for organizations?
RMH Franchise Holdings (RMH), which owns and operates more than 160 Applebee’s restaurants, recently disclosed that malware were uncovered on their point-of-sale (PoS) systems.