New Phishing Scam Reels in Netflix Users to TLS-Certified Sites
Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates. READ MORE HERE…
Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates. READ MORE HERE…
A new botnet from the Dark Web displays a never-before-seen level of complexity in terms of the sheer breadth of its various tools. READ MORE HERE…
This is the first evidence of the China-linked threat actor’s activity since hacked the U.K. government and military in 2017 (which wasn’t made public until 2018). READ MORE HERE…
The onus behind IoT security has become so muddled that no one knows who to point fingers at. READ MORE HERE…
The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure. READ MORE HERE…
Researchers were able to discover a way to hack the device in less than an hour. READ MORE HERE…
The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices. READ MORE HERE…
Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature. READ MORE HERE…
Attackers can remotely access the infrastructure to install, remove or encrypt any application that the affected companies are running in the cloud. READ MORE HERE…
The IP cameras have a slew of bugs allowing bad actors to control them, add them to a botnet, or render them useless. READ MORE HERE…