Security researchers uncovered a multi-stage attack chain that takes advantage of a design behavior in RTF files and a vulnerability in Microsoft Office (CVE-2017-8570) to deliver the Formbook RAT.
With plenty of voice-based internet-of-things devices in use around the world, it is expected that they will become riddled with compatibility issues and privacy concerns. What threats are there and what can be done to mitigate them?
We look at some of the defining moments in the threat landscape that helped steer organizations toward adding proactive incident response strategies to their cybersecurity defenses.
Security researchers reported that at least 1,000 websites running on the Magento platform were targeted via brute-force attacks to steal credit card data and install cryptocurrency-mining malware.
Beijing’s traffic authority gives tech company Baidu a go-ahead for testing self-driving cars on its public roads. What does this mean for self-driving cars and technologies?