Many phishing websites are now using unique user IDs, giving defenders a signal to detect phishing attacks before they do much damage.
Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.
Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware.
Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.
Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices.
Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system.
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.
A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication.
By replacing a PC's SPI flash chip with one that contains rogue code, an attacker can can gain full, persistent access.
A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances.
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
New Verizon report shows a big gap between organisations' mobile security risk concerns and mobile security best practices they implement.
The decade-old Qbot financial malware has resurfaced with an improved version in a new attack that has infected thousands of systems so far.
Microsoft has removed eight applications from its app store for Windows that were mining Monero crypto-currency without users' knowledge.
The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, according to DLA Piper findings.