Talos researchers spotted a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
Checkpoint has discovered a new attack method subbed "Bashware" that can allow hackers to bypass common security solutions with any known malware. The Bashware technique takes advantage of a new…
Security researchers have disclosed multiple Bluetooth vulnerabilities that could threaten billions of smartphones from Android and Apple and millions of Internet of Things (IoT) devices, such as smart TVs, printers and others that may use the Bluetooth wireless protocol.
In case you missed it, the National Institute of Standards and Technologies (NIST) published a new guideline "An Introduction to Information Security" for individuals looking to get a better understanding of introductory information security best practices.
A massive data breach of credit equity firm Equifax has potentially impacted 143 million customers.
A sophisticated attack group known as Dragonfly is targeting the energy sector in Europe and North America in a new wave of cyber attacks with objective to severely disrupt operations.
These 10 critical yet practical data security controls can help your small or mid-sized business safeguard sensitive data and be better prepared for the General Data Protection Regulation (GDPR), soon to…
Nearly four million Time Warner Cable (TWC) customer records were left exposed online via a third party data leak.
The Zscaler ThreatLabZ research team has spotted a new remote access Trojan (RAT) family called Cobian RAT that contains a backdoor module, which retrieves command and control (C&C) information from a predetermined URL that is controlled by the original author.
Serious security vulnerabilities have been found in Arris-manufactured modems used by AT&T's U-verse service.